source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/Aglets%20%28software%29 | Aglets is a Java-based mobile agent platform and library for building mobile agents based applications. They are able to autonomously and spontaneously move from one host to another in a computer network carrying a piece of code with it. It can be programmed to execute at a remote host and show different behaviours at different hosts. Java based security implementations take care of authorised access to local resources at the remote hosts. A development kit, IBM Aglets Workbench (AWB), provided the API and the platform to run aglets.
Aglets was originally developed by Mitsuru Oshima ("") and Danny Lange at the IBM Tokyo Research Laboratory. IBM was responsible for most of the 1.x release. However the project is now hosted at SourceForge.net as an open source project, where it is distributed under the IBM Public License. In the beginning, the SourceForge releases had been only bug-fix ones, but 2.x series (most of which came from open source community only) had better security and thread management. It now includes a log4j based logging system and a few bug-fixes of the older versions.
See also
Mobile agent
References
External links
http://aglets.sourceforge.net/ — Aglets portal site
https://web.archive.org/web/20100514184915/http://www.trl.ibm.com/aglets/ — IBM Research
http://www.artima.com/underthehood/aglets.html — "The Architecture of Aglets", Bill Venners, April 1997
Java platform software
IBM software |
https://en.wikipedia.org/wiki/Bongard%20problem | A Bongard problem is a kind of puzzle invented by the Soviet computer scientist Mikhail Moiseevich Bongard (Михаил Моисеевич Бонгард, 1924–1971), probably in the mid-1960s. They were published in his 1967 book on pattern recognition. The objective is to spot the differences between the two sides. Bongard, in the introduction of the book (which deals with a number of topics including perceptrons) credits the ideas in it to a group including M. N. Vaintsvaig, V. V. Maksimov, and M. S. Smirnov.
Overview
The idea of a Bongard problem is to present two sets of relatively simple diagrams, say A and B. All the diagrams from set A have a common factor or attribute, which is lacking in all the diagrams of set B. The problem is to find, or to formulate, convincingly, the common factor. The problems were popularised by their occurrence in the 1979 book Gödel, Escher, Bach by Douglas Hofstadter, himself a composer of Bongard problems. According to Hofstadter, "the skill of solving Bongard problems lies very close to the core of 'pure' intelligence, if there is such a thing".
In popular culture
Bongard problems form the heart of the game Zendo.
Scientific works on Bongard problems
Bongard, M. M. (1970). Pattern Recognition. Rochelle Park, N.J.: Hayden Book Co., Spartan Books. (Original publication: Проблема Узнавания, Nauka Press, Moscow, 1967)
Maksimov, V. V. (1975). Система, обучающаяся классификации геометрических изображений (A system capable of learning to classify geometric images; as translated from the Russian by Marina Eskina), in Моделирование Обучения и Поведения (Modeling of Learning and Behavior, in Russian), M.S. Smirnov, V.V. Maksimov (eds.), Nauka, Moskva.
Hofstadter, D. R. (1979). Gödel, Escher, Bach: an Eternal Golden Braid. New York: Basic Books.
Montalvo, F. S. (1985). Diagram Understanding: the Intersection of Computer Vision and Graphics. M.I.T. Artificial Intelligence Laboratory, A. I. Memo 873, November 1985.
Saito, K., and Nakano, R. (1993) A Concept Learning Algorithm with Adaptive Search. Proceedings of Machine Intelligence 14 Workshop. Oxford University Press. See pp. 347–363.
Hofstadter, D. R. and the Fluid Analogies Research Group (1995). Fluid Concepts and Creative Analogies: Computer Models of the Fundamental Mechanisms of Thought. New York: Basic Books.
Hofstadter, D. R. (1995). On Seeing A’s and Seeing As. Stanford Humanities Review 4/2 pp. 109–121.
Hofstadter, D. R. (1997). Le Ton beau de Marot. New York: Basic Books.
Linhares, A. (2000). A glimpse at the metaphysics of Bongard problems . Artificial Intelligence, Volume 121, Issue 1-2, pp. 251–270.
Foundalis, H. (2006). Phaeaco: A Cognitive Architecture Inspired by Bongard’s Problems. Doctoral dissertation, Indiana University, Center for Research on Concepts and Cognition (CRCC), Bloomington, Indiana. Foundalis left the field in 2008 due to ethical concerns regarding machines that can pass as human, and restarted in 2011 having considered that human suicide |
https://en.wikipedia.org/wiki/Tokai%20Communications | Tokai Communications Corporation Inc (known as Vic Tokai Corporation until 2011) is a telecommunications company in Japan providing DSL services and network solutions. Its headquarters are in the in Aoi-ku, Shizuoka, Shizuoka Prefecture. In North America, it is best known for its video games during the late 1980s and throughout the 1990s. In the US, they published games for the Nintendo Entertainment System, the Game Boy, the Super Nintendo Entertainment System, the Nintendo 64, the Sega Genesis, the Sega CD, the Sega Saturn, and the PlayStation.
History
Vic Tokai was founded on as Yaizu Cable Vision Co, a CATV service provider. The following year, in 1978, it adopted the name of Vic Tokai. The "Vic" in Vic Tokai's name stood for Valuable Information & Communication. The "Tokai" part is the name of its then parent company, Tokai Corporation, a Japanese natural gas utility founded in 1950.
Vic Tokai began selling data processing services and computer hardware in April 1982, a sector that until then was handled by parent Tokai Corporation. In 1983, it began developing online and graphics applications for office computers.
In April 1987, parent company Tokai corporation handed its remaining computer-related branches, such as electronic calculation and operational sections, to Vic Tokai, thus making the latter company able to handle data processing operations independently. Vic Tokai expanded in 1988 when it acquired another telecommunication company. The company also launched its first system consulting software the same year.
The 1990s saw a number of new products by Vic Tokai available to the Japanese market. In 1993, Vic Tokai introduced the first version of its long running (and still existing) lineup of network solution products called "TOP-VENUS". Later, Vic Tokai released its own Electronic Data Interchange package known as JFT (Java File Transfer) in 1996. Then in 1998 Vic Tokai developed its "Knowledge Stage" lineup, which is dedicated to helping companies develop their Intranet.
In April 2000, Vic Tokai merged with another CATV company that provides Internet connection services. As a result, Vic Tokai itself immediately became an Internet service provider, and a year later, in April 2001, it entered the ADSL market. Vic Tokai would soon establish a partnership with Japanese peer-to-peer Internet exchange company JPIX.
As the company continued to grow, Vic Tokai earned its place in the market listing of the JASDAQ as of June 2002.
By March 2005, Vic Tokai had completed the build-out of its own high-capacity optical fiber network infrastructure between Tokyo and Nagoya to improve network support for its Internet service customers and enterprises. Vic Tokai continued its expansion in October 2005 when it merged again, this time with Tokai Broadband Communications, enabling Vic Tokai to enter the mobile broadband industry.
On April 1, 2011, Vic Tokai and (then) parent company Tokai Corporation jointly created Tokai Holdings Corpora |
https://en.wikipedia.org/wiki/UAC | UAC may refer to:
Computing
User Account Control, a security feature in Microsoft Windows
Session Initiation Protocol#User agent client
Organizations
Ulster Army Council, 1973 Northern Ireland loyalist paramilitary group
Undeb Amaethwyr Cymru, the Farmer's Union of Wales
Unemployment Action Center, a non-profit organization in New York City, US
United Apostolic Church
Union of Catholic Apostolate
Université d’Abomey-Calavi, part of the National University of Benin
United Africa Company, 20th-century British company
United Africa Company of Nigeria, formerly a subsidiary of United Africa Company
United Aircraft Corporation, Russian aerospace and defense company
United Arab Command, of the Arab League
United Athletic Conference, an American college football conference that started play in 2023
Universities Admissions Centre, Australia
Urban Appalachian Council, Cincinnati, US
Other
Unaccompanied Alien Children, United States government classification for children in immigration custody
Unified Arab Code, a Civil Code produced by the Arab League between 1988 and 1996
Urban adult contemporary, radio music format
Union Aerospace Corporation, fictional military contractor in the Doom video game franchise
UAC, a codon for the amino acid tyrosine |
https://en.wikipedia.org/wiki/Retail%20software | Retail software is computer software, typically installed on PC-type computers post 2005, delivered via the Internet (also known as cloud-based). Traditionally this software was delivered via physical data storage media sold to end consumer but very few companies still provide their software using physical media. The software is typically sold under restricted licenses (e.g. EULAs) or in the case of cloud-based software sold as a Software-as-a-Service (SaaS) model.
Types
Cloud-based software: this is software that is not installed on a user's device but delivered on-demand via the Internet to the end user's device(s) either through web-based apps or native apps (iOS and Android). Most new software companies provide both or a combination of web, and native apps which may provide different functionality depending on the actual user in a client company.
OEM Pack -HOW This is a licensed copy of software given by the software manufacturer to a computer manufacturer to pre-install on a computer being sold to a customer. A backup copy may or may not be provided on a CD to the end-user along with the computer.
Box Pack - This is a licensed copy of the software that an end-user buys off the shelf from any authorized retail outlet. They may sometimes be more highly-priced than OEM versions as you generally get additional software along with the main software within the pack.
Paper License - This is a scheme provided by the software manufacturer to companies or businesses that require many copies of particular software to be installed on multiple computers within the organization (Volume license key). Say, for example, a company requires installing software on 50 computers in its office. Instead of buying 50 CDs and managing those 50 individually, the company can buy one copy of the software and request the software vendor to issue a paper license authorizing them to use it on 50 computers. The software vendor then charges them accordingly. This method is also much cheaper than buying 50 individual packs.
History
An important historical event that led to the expansion of the market for retail software was the Open Letter to Hobbyists by Bill Gates in 1976.
Until the 2000s with the emergence of the Internet, retail software represented the vast majority of all end consumer software used and was referred to as shrinkware because of software almost always ships in a shrinkwrapped box.
The most famous examples of retail software are the products offered on the IBM PC and clones in the 1980s and 1990s, including famous programs like Lotus 123, Word Perfect and the various parts that make up Microsoft Office. Microsoft Windows is also shrinkware, but is most often pre-installed on the computer.
The rise of the Internet and software licensing schemes has dramatically changed the retail software market e.g. by Digital Distribution. Users are capable of finding shareware, freeware and free software products or use Web services as easily as retail. Produ |
https://en.wikipedia.org/wiki/Bravo%20%28editor%29 | Bravo was the first WYSIWYG document preparation program. It provided multi-font capability using the bitmap displays on the Xerox Alto personal computer. It was produced at Xerox PARC by Butler Lampson, Charles Simonyi and colleagues in 1974.
Overview
Bravo was a modal editor—characters typed on the keyboard were usually commands to Bravo, except when in "insert" or "append" mode, in which case they were entered into the character buffer. Bravo made extensive use of the mouse for marking locations in the text, as well as selecting areas of the text, but it was not used for command entry. (Being at the very dawn of graphical user interface design, a non-command driven interface was judged too ambitious and possibly even inefficient and cumbersome.)
In addition to a long list of commands for controlling the formatting of the text (e.g. the ability to adjust left and right margins for sections of text, select fonts, etc.) Bravo also supported use of multiple buffers (i.e. files), and also multiple windows.
Although Bravo usually displayed the text with formatting (e.g. with justification, fonts, and proportional spacing of characters), it did not normally attempt to reproduce the way a page would look in hardcopy. This was because the Alto monitor provided a resolution of 72 pixels per inch, but the laser printers used at PARC provided a resolution of 300 PPI. This meant that the screen could at best only provide an approximation of the way the page would look when printed. Instead, the normal display mode showed the text using character sizes, etc., more suited to the capability of the display.
There was a special display mode which did attempt to show the text exactly as it would appear when printed, and the normal command set worked in that mode as well. However, because the screen image was necessarily an approximation, one would occasionally find characters and words slightly off (a problem that continues to this day with word processing systems).
The 72 PPI pixel size closely approximated the 72.27 points per inch used in the commercial printing industry, so that a pixel in Bravo would be the same size as a typeface point.
Bravo was the base for Gypsy, a later document system on the Alto, the first with a modern graphical user interface.
Bravo was followed by BravoX, which was developed in 1979 under Simonyi's leadership at Xerox's Advanced Systems Development (ASD) group. BravoX was "modeless", as was Gypsy. While Bravo (and BravoX) were originally implemented in BCPL for the Xerox Alto, BravoX was later re-implemented in a language called "Butte" ("a Butte is a small Mesa", as Charles Simonyi used to say). Alto BCPL compiled into Data General Nova machine instructions, which were in turn interpreted by Alto microcode. Butte compiled into Butte-specific byte codes, which were interpreted by special Alto microcode, similar to the Mesa bytecode interpreter.
EDIT command
Early versions of Bravo had a command interface designed such |
https://en.wikipedia.org/wiki/La%20Strada%20International%20Association | La Strada International (LSI) is an international NGO network addressing the trafficking of persons in Europe.
Creation
La Strada International was created in October 2004, formalising an informal network that had existed since 1995. , it included member organisations from Belarus, Bulgaria, Czech Republic, Macedonia, Moldova, the Netherlands, Poland, and Ukraine and an International Secretariat based in Amsterdam, The Netherlands. In each of the eight member countries the programme is implemented by independent human rights non-governmental organizations.
Aims
LSI has an International Secretariat, whose main aims are information collection and research, with an online database for collating national-level data on individual cases and patterns of human trafficking; developing organisational capacity; and communicating in international organisations.
Actions
In 2002, La Strada Ukraine, together with the Office for Democratic Institutions and Human Rights (ODIHR) of Organization for Security and Co-operation in Europe (OSCE), started a free national telephone hotline service in Ukraine for victims of human trafficking and for people planning on international travel and wanting advice on human trafficking risks.
Networking
La Strada International is a member organisation of the NGO networks Global Alliance Against Traffic in Women, PICUM — the Platform for International Cooperation on Undocumented Migrants and the Human Rights and Democracy Network.
In July 2010, LSI was granted consultative status by the United Nations Economic and Social Council (ECOSOC). The consultative status gives LSI the ability to actively participate in the work of ECOSOC, as well as other bodies within the UN, such as the UN Secretariat. La Strada International will be allowed to consult with UN member states and discuss concerns and ideas within the field of human trafficking. LSI is also a member of OSCE Alliance Expert Coordination Team, the EU Fundamental Rights Agency Platform and has a participatory status with the Council of Europe.
LSI cooperates in anti-trafficking activities with EU and UN bodies. From 2009 to 2012 La Strada International, together with Anti-Slavery International implemented a three-year European project called "Comp.act". The aim of the project was to improve access to justice and guarantee compensation for trafficked people. The project received institutional support from the Council of Europe and OSCE/ODIHR.
In 2013, LSI began coordinating the La Strada NGO Platform, a network of 21 European (EU and non-EU) NGOs from 20 countries, working to address human trafficking, migration, labour rights, and sex work.
References
Organizations that combat human trafficking
Professional networks
International nongovernmental organizations
Eastern Europe
Missing people organizations
International organisations based in the Netherlands
Sex worker organisations based in the Netherlands |
https://en.wikipedia.org/wiki/Electoral-vote.com | Electoral-Vote.com (formally Electoral Vote Predictor) is a website created by computer scientist Andrew S. Tanenbaum. In the periods leading up to U.S. federal elections, the site's primary content is poll analysis to project election outcomes. Since the 2016 elections, the site also has featured daily commentary on political news stories.
The site was created during the lead-up to the 2004 U.S. Presidential election to predict the winner. The site tries to improve on national polls usually reported in the media, by instead analyzing the most recent polls on the state level, thus simulating the process by which Electoral College votes are determined in the actual election. Updated throughout the campaign, visitors can see who is "ahead" at any time.
Instead of the site lying fallow between election cycles the way it did before, starting in 2015 the site provides daily commentary continuously. On weekends the website focuses more on interacting with readers, with Tanenbaum and Bates answering reader questions on Saturdays and posting a mailbag of reader letters on Sundays.
Several political commenters, such as Chris Weigant, have noted the helpfulness of the website in aggregating polls state by state in order to predict the outcomes of elections.
Staff
Through most of the 2004 campaign, Andrew Tanenbaum went by the alias "the Votemaster", keeping his identity a secret. Tanenbaum is a civil libertarian, a member of Democrats Abroad (he is a long-time resident of the Netherlands) and generally supports Democratic candidates for office. He revealed his identity on November 1, 2004, as well as stating his reasons and qualifications for running the website.
In 2015, Tanenbaum was joined by Christopher Bates, who contributes to the site under the name Zenger, chosen in honor of John Peter Zenger. Their respective contributions are differentiated by (V) and (Z).
History
2004 Presidential election
The site began operating on May 24, 2004 with a simple map and a few links to other pages. During the months leading up to the 2004 U.S. Presidential election, the site was updated daily to reflect new state polls. The site was the most popular election site in the country, in the top 1,000 Web sites in the world, and in the top 10 blogs in the world. In November 2004, the website had more than 650,000 hits per day.
The main page consisted of a map of the United States with the individual states colored varying shades of red or blue, based on the polls for that state. For instance, Illinois, a state that was polling strongly for Democrat John Kerry was colored dark blue, whereas Michigan where Kerry's lead polled by a small margin was colored light blue. Analogously, Texas was dark red during the whole campaign, indicating Bush's strong lead there. All of the polling data were provided in multiple formats, including HTML, Excel, and .csv for downloading. Other features included historical data on previous elections, charts and animations show |
https://en.wikipedia.org/wiki/Canadian%20Health%20Network | The Canadian Health Network (CHN) was established in 1999 as a national, bilingual health promotion service operated by the Public Health Agency of Canada and major health organizations across Canada. It was an on-line collaborative service and includes health information providers such as national and provincial/territorial non-profit organizations, as well as universities, hospitals, libraries and community organizations.
The CHN offered dependable, up-to-date information on health promotion and disease and injury prevention, to help individuals and communities make healthy choices that improve the quality of their life. It was known to be of the most comprehensive networks of its kind in the world. It was a called a 'network' since the information was amalgamated from a variety of Canadian health organizations.
In November 2007, the Public Health Agency of Canada announced that the service would end, and on April 1, 2008, the website was replaced with a redirect notice.
References
1999 establishments in Canada
2008 disestablishments in Canada
Government-owned websites
Government databases in Canada
Health Canada
Canadian medical websites |
https://en.wikipedia.org/wiki/Manindra%20Agrawal | Manindra Agrawal (born 20 May 1966) is an Indian computer scientist and professor at the Department of Computer Science and Engineering at the Indian Institute of Technology, Kanpur. He was the recipient of the first Infosys Prize for Mathematics, the Godel Prize in 2006; and the Shanti Swarup Bhatnagar Award in Mathematical Sciences in 2003. He has been honoured with Padma Shri, India's 4th highest civilian award, in 2013.
Career
He created the AKS primality test with Neeraj Kayal and Nitin Saxena, for which he and his co-authors won the 2006 Fulkerson Prize, and the 2006 Gödel Prize. He was also awarded 2002 Clay Research Award for this work. The test is the first unconditional deterministic algorithm to test an n-digit number for primality in a time that has been proven to be polynomial in n.
In September 2008, Agrawal was chosen for the first Infosys Mathematics Prize for outstanding contributions in the broad field of mathematics. He also served on the Mathematical Sciences jury for the Infosys Prize in 2014 and 2015. He was a visiting scholar at the Institute for Advanced Study in 2003-04.
Agarwal served as the Deputy Director of IIT Kanpur from 2017-2021.
Awards and honors
Clay Research Award (2002)
S S Bhatnagar Prize in Mathematical Sciences (2003)
ICTP Prize (2003)
Fulkerson Prize (2006)
Gödel Prize (2006)
Infosys Prize (2008)
G.D. Birla Award for Scientific Research (2009)
TWAS Prize in Mathematics (2010)
Goyal Prize (2017)
References
External links
Homepage
Blog report
Living people
1966 births
Clay Research Award recipients
Fellows of The National Academy of Sciences, India
Fellows of the Indian Academy of Sciences
Fellows of the Indian National Science Academy
Gödel Prize laureates
Indian computer scientists
IIT Kanpur alumni
Academic staff of IIT Kanpur
Institute for Advanced Study visiting scholars
Indian number theorists
People from Kanpur
Recipients of the Padma Shri in science & engineering
21st-century Indian mathematicians
20th-century Indian mathematicians
TWAS laureates
Foreign associates of the National Academy of Sciences
Recipients of the Shanti Swarup Bhatnagar Award in Mathematical Science
Theoretical computer scientists |
https://en.wikipedia.org/wiki/KFAI | KFAI (90.3 FM Minneapolis) is a community radio station in Minnesota. The station broadcasts a wide variety of music, and also airs programming catering to many of the diverse ethnic groups of the region. KFAI has frequently been honored by local media critics for its shows and musical diversity (for instance, the local alternative weekly City Pages has frequently included it in the annual "Best of the Twin Cities" awards).
The station offers public access services, so they encourage anyone in the community to make their own show and have it broadcast over the air. The station is part of Minnesota's AMPERS network and, since it covers the largest population, is considered by many to be the group's flagship station. The call sign stands for Fresh Air, Inc., the non-profit organization that owns KFAI.
KFAI's studios are located on Riverside Avenue in Minneapolis, while its transmitter is located atop the IDS Center in downtown Minneapolis.
History
The station first went on the air with a 10-watt signal on May 1, 1978, after drawn-out deliberations with the Federal Communications Commission, which was licensing a few low-power FM stations at the time. The first home was in the belfry of the Walker Community Church in South Minneapolis. In 1984, the primary transmitter was moved from the roof of the Seward Co-op to the top of the Foshay Tower in downtown Minneapolis and upgraded to 125 watts. The studios moved from the church two years later, when it moved to the second floor of a Butler Drug store on Lake Street. In 1991, studios were built especially for Fresh Air Radio at Cedar-Riverside near the University of Minnesota, where it remains today. A 170-watt West St. Paul translator station went up in 1994 and was sold to Hmong Radio Broadcast, LLC in May 2020.
In March 2007, KFAI's main transmitter moved to IDS Center, after the new owner of Foshay Tower evicted all current tenants of the building as part of a redevelopment plan to turn it into a hotel . Since November 6, 2007, the station has been operating under an FCC Construction Permit with an upgraded effective radiated power of 900 Watts and an IDS Center tower height of 247 meters (811 feet) above ground level. This upgrade allows the station to have a stronger signal from the IDS Center which extends the station's coverage deeper into St. Paul and the southeast suburbs.
Due to KFAI's limited signal power, programming is targeted to the Twin Cities communities. Three other IPR stations exist in Minneapolis-St. Paul: KBEM-FM (jazz), KMOJ (urban), and KUOM (college/eclectic). KVSC, another college station in St. Cloud, Minnesota, can also be received by some area residents. The station had major plans for expansion into HD radio by the end of 2008. As part of this expansion, on November 16, 2008, the station switched over to a new 900-watt transmitter and directional antenna for its 90.3 FM signal, significantly increasing the broadcast coverage area.
In mid-2010, KFAI chang |
https://en.wikipedia.org/wiki/KQAL | KQAL (89.5 FM) is a radio station broadcasting a Variety format. Licensed to Winona, Minnesota, United States. The station is currently owned by Winona State University and features local programming, plus programs from other educational & community-based radio stations.
History
KQAL-FM at Winona State University in Winona, Minnesota went on the air in December 1975 as a ten watt station. An alternative independent radio station from the beginning, broadcasting began from the roof of the Performing Arts Center. KQAL was started by faculty members Jacque Reidelberger and Brice Wilkinson and student manager, the late Bruce Hittner. A laboratory for the Speech Department at WSU, KQAL has been staffed primarily by students from its inception.
In 1980 KQAL, Winona's alternative music radio, was placed under the jurisdiction of the newly created Mass Communication Department at WSU. KQAL increased its power output to 1,100 watts in 1981 and it became a member of the Associated Press.
In 1989, the power output was increased to 1,800 watts and the transmitter moved from the roof of the Performing Arts Center to a 400-foot tower leased from KWNO (AM) on Garvin Heights. Also in '89 two satellite receiving dishes were installed at the Performing Arts Center.
The entire studio complex was remodeled in 1991 with new equipment and computers.
In 1995, the station's website went online and computer based digital audio editing equipment was installed.
KQAL continued the transition to the digital era in 1998 when computer based, hard drive audio storage and automation was introduced, virtually eliminating the use of tape at the station. The original system was replaced in 2002 with a new, more robust and reliable system.
In 2009 KQAL began a move from the Performing Arts Center to Phelps Hall which was extensively remodeled and new radio and TV studios were constructed. KQAL began broadcasting from these new studios in 2010.
References
External links
Radio stations in Minnesota
College radio stations in Minnesota
Winona State University |
https://en.wikipedia.org/wiki/KVSC | KVSC 88.1 FM in Saint Cloud, Minnesota is part of Minnesota's Independent Public Radio network. It is operated by St. Cloud State University and broadcasts a freeform radio format. KVSC-FM is a non-commercial educational public broadcasting radio station that is a student-run college radio station and operates 365 days per year, nearly 24 hours a day.
Coverage
KVSC-FM has a power of 16,500 watts with a listening radius of about 70 miles. The station's frequency is 88.1 MHz, "farthest left on your FM dial." Its transmitter is located near Highway 15 and Interstate 94 south of St. Cloud proper. KVSC also broadcasts to the Minneapolis-St.Paul area via 89.9-HD3.
Programming
KVSC offers a blend of progressive rock, jazz, folk, reggae, world, blues, Minnesota music, and much more. KVSC has a wide variety of news programming which includes coverage of university, local & statewide events, and live broadcasts of St. Cloud State University sporting events.
The station carries an HD-subchannel, KVSC 88.1-2 that rebroadcasts sister station Radio X. It also has another subchannel, 88.1-4 that carries talk programming.
History
KVSC first began operations as a 10-watt, Class D broadcast facility on May 10, 1967, broadcasting at 88.5 megahertz. For ten years prior to this, students interested in radio broadcasting had no live-air broadcasting opportunities. The students would pre-produce all their programming in the university studios, which would then be aired on WJON (AM1240) radio. This meant that all programs produced would have to fit in with WJON's format or they would not get on the air. It was soon decided that St. Cloud State University had a need for its own radio broadcast facility, and thus KVSC was developed.
The call letters were selected to signify that the station would serve as the Voice of Saint Cloud. The station was run exclusively by volunteers from the university student population and was financed by the student activity fees and the Mass Communications department. The music format was predominantly classical music, with a smaller percentage of folk and rock music sprinkled in. The overall operation was small and required minimal funding, outside of the need for equipment acquisition and repair.
In 1969, the Higher Education Coordination Board formed a subcommittee to organize and work with communications programs in Minnesota higher-education institutions. KVSC's adviser was instrumental in developing this committee. In 1972, the HECB subcommittee was disbanded in favor of a new organization. The Association of Minnesota Public and Educational Radio Stations (AMPERS), a non-profit corporation, was officially registered on July 26, 1977. It comprised the same member stations which had been involved in the HECB committee. KVSC is a charter member of AMPERS and two of its managers have served terms as president.
On numerous occasions throughout the 1970s, KVSC sought approval to increase its broadcast power, with the final approval |
https://en.wikipedia.org/wiki/Texture%20memory | Texture memory is a type of digital storage that makes texture data readily available to video rendering processors (also known as GPUs), typically 3D graphics hardware. It is most often (but not always) implemented as specialized RAM (TRAM) that is designed for rapid reading and writing, enabling the graphics hardware increased performance in rendering 3D imagery.
Larger amounts of texture memory allow for more detailed scenes.
Computer memory |
https://en.wikipedia.org/wiki/Enters%20the%20Colossus | Enters the Colossus is the debut EP by American hip hop artist Mr. Lif. It was released November 14, 2000, on the Def Jux record label.
Track listing
"DataBlend" – 3:20
Produced by Mr. Lif
"Cro-Magnon" – 3:56
Featuring Illin P
Produced by DJ Fakts One
"Pulse Cannon" – 3:00
Featuring Insight and T-Ruckus
Produced by Insight
"Enters the Colossus" – 3:08
Produced by Mr. Lif
Contains a sample from "Lyrics to Go, by A Tribe Called Quest
"Avengers" – 2:56
Featuring Akrobatik
Produced by DJ Fakts One
"Front on This" – 3:57
Produced by DJ paWL
"Arise" – 10:45
Produced by El-P
Includes bonus track "Retrospect", produced by DJ Fakts One
References
External links
Mr. Lif official website
Definitive Jux official website
2000 debut EPs
Mr. Lif albums
Definitive Jux EPs
Albums produced by El-P |
https://en.wikipedia.org/wiki/LUnix | LUnix (short for "Little Unix") is a Unix-like multi-tasking operating system designed to run natively on the Commodore 64 and Commodore 128 home computer systems. It supports TCP/IP networking (SLIP or PPP using an RS-232 interface). Unlike most Unix-like systems, LUnix is written in 6502 assembly language instead of C.
The first version of LUnix was released in 1993; the current version 0.21 dates from 2004. Amongst others, it supports preemptive multitasking, Unix pipes, a variety of protocols like TCP/IP, SLIP, PPP and RS-232, dynamic memory management and virtual consoles. It contains a web server and clients for telnet, POP3 and FTP and can act as a terminal or terminal server over RS-232.
LUnix was developed by Daniel Dallmann and contributed by Ilker Ficicilar, Stefan Haubenthal, Maciej Witkowiak and Paul Gardner-Stephen in late 1990s. The first generation LUnix had support for faster RS-232 via clever software tricks, 80 column VIC and VDC screen support, PS/2 keyboard support, and small set of standard Unix commands. It is possible with this first distribution to attach two keyboards and two monitors and one RS-232 terminal to set up a three simultaneous, multitasking sessions on a C128. LUnix also supports 2 MHz mode and boot disk convenience of C128 platform.
LUnix came with an extensive documentation at the time. Well-defined library calls, relocatable code support and decent memory management functions made it possible to develop software for LUnix easily.
See also
OS-9 a multi-tasking operating system implemented in native code for the 6809 microprocessor
GeckOS a multi-tasking operating system for the 6502, offering binary compatibility with LUnix when linked to lib6502
References
External links
Sourceforge project page
lunix.d64 download link in Ilker Ficicilar's CBM site
Unix variants
Commodore 64 software
Free software operating systems
Hobbyist operating systems
Lightweight Unix-like systems
Assembly language software
Discontinued operating systems |
https://en.wikipedia.org/wiki/Glide | Glide may refer to:
Gliding flight, to fly without thrust
Computing
Glide API, a 3D graphics interface
Glide OS, a web desktop
Glide (software), an instant video messenger
Glide (docking), a molecular docking software by Schrödinger
Flight and movement
A measure used by Innova Discs, to evaluate flying disc performance
Bacterial gliding, a form of motility in biology
Music
Glide (album), a 2008 album by Jerry Douglas
Glide, stage name of guitarist Will Sergeant
"Glide", a song by the jam band Phish from their 1992 album A Picture of Nectar
"Glide", a song by Stone Temple Pilots from their album No. 4
Glide (music synthesis), a musical synthesizer parameter equivalent to portamento
Organizations
Glide FM, independent local radio station broadcasting from Oxfordshire, United Kingdom
Glide Memorial Church, San Francisco, California, United States
Glide Foundation, a charitable foundation of Glide Memorial Church
Products
Glide (automobile) (1902–1920), manufactured by the Bartholomew Company
Oral-B Glide, a dental floss that before its acquisition by Procter & Gamble was known simply as "Glide Floss"
Glide, a Pillow Pal dolphin made by Ty, Inc.
Other uses
Glide, in linguistics, a synonym for semivowel
Glide (Martian crater)
Glide, Oregon, census-designated place in the United States
Glide High School, Glide, Oregon, United States
Glide reflection, a geometrical transformation
USS Glide
See also
Glider (disambiguation)
Gliding (disambiguation)
The Glide (disambiguation) |
https://en.wikipedia.org/wiki/Solidaridad | The Solidaridad Network is an international civil society organisation founded in 1969. Its main objective is facilitating the development of socially responsible, ecologically sound and profitable supply chains. It operates through eight regional expertise centers in over 50 countries.
History
The organization was founded in 1969.
In 1988, Solidaridad founded the Max Havelaar coffee label, considered the starting point for the Fairtrade movement. Having introduced Fairtrade coffee, Solidaridad went on to develop a similar scheme for bananas in 1996. In the 1990s, Solidaridad broadened its scope toward working with companies in corporate social responsibility (CSR) programmes and certification. Moving forward, the organization focused further on working with producers in international supply chains by supporting round tables for commodities such as coffee, livestock, soy, cocoa, cotton, livestock, dairy, tea, textiles, sugarcane, fruit & vegetables, gold, textiles, palm oil, and aquaculture.
In 2016, Solidaridad launched a five-year strategic plan focussed on four thematic areas- robust infrastructure, good practices, sustainable landscapes and enabling policy environments.
In 2018, Solidaridad won the Arrell Global Food Innovation Award.
Initiatives
Textiles & Cotton
In 2017, Solidaridad launched the Sustainable Cotton Ranking Index with the World Wildlife Fund and Pesticide Action Network UK. This analyzed the performance of 75 companies and their sustainable cotton uptake. The report revealed that the majority of brands are not doing enough to increase their sustainable cotton use.
Soy
Solidaridad is one of the founders and board members of the Round Table on Responsible Soy. In 2017, Solidaridad carried out a project that led to the certification of 30,125 tons of soybeans produced by 18 small and medium-scale farmers in the region of Silvânia and Orizona, Goias. This was the first time small and medium-scale soy growers in Goias, Brazil have been able to receive certification from the Round Table on Responsible Soy.
Gold
Solidaridad assists small-scale gold mines to reduce their environmental impact. In Ghana, Solidaridad helps miners to implement mercury-free technologies. In 2016, the first mine in Africa to reach Fairtrade certification, Syanyonja Artisan Miners' Alliance in Uganda, was a partner of a Solidaridad partnership with Fairtrade Foundation in East Africa.
Palm Oil
Solidaridad promotes better land-use planning to meet the growing demand for palm oil. In 2014, Solidaridad launched the Sustainable West Africa Palm Oil Programme (SWAPP).
In 2016, Henkel and BASF launched a collaboration with Solidaridad in Indonesia to train 5,500 smallholders implement good agricultural practices. The project spans an area of roughly 16,000 hectares.
References
Organizations established in 1969 |
https://en.wikipedia.org/wiki/Magnolia%20denudata | Magnolia denudata, the lilytree or Yulan magnolia (), is native to central and eastern China. It has been cultivated in Chinese Buddhist temple gardens since 600 AD. Its flowers were regarded as a symbol of purity in the Tang Dynasty and it was planted in the grounds of the Emperor's palace. It is the official city flower of Shanghai.
Description
Magnolia denudata is a rather low, rounded, thickly branched, and coarse-textured tree to tall. The leaves are ovate, bright green, 15 cm long and 8 cm wide. The bark is a coarse, dark gray. The 10–16 cm white flowers that emerge from early to late spring, while beautiful and thick with a citrus-lemon fragrance, are prone to browning if subjected to frost.
Cultivation
Magnolia denudata is used as an ornamental tree in gardens. It is similar to other magnolias in that it likes rich, moist soil and should be planted in a location where it is protected from elemental extremes. This plant has gained the Royal Horticultural Society's Award of Garden Merit.
Gallery
References
External links
Magnolia denudata images at the Arnold Arboretum of Harvard University Plant Image Database
Photos of flowers
denudata
Trees of China
Medicinal plants
Garden plants of Asia
Ornamental trees
Endemic flora of China |
https://en.wikipedia.org/wiki/Alan%20Burns%20%28professor%29 | Professor Alan Burns FREng FIET FBCS FIEEE CEng is a professor in the Computer Science Department at the University of York, England. He has been at the University of York since 1990, and held the post of Head of Department from 1999 until 30 June 2006, when he was succeeded by John McDermid.
He is a member of the department's Real-Time Systems Research Group, and has authored or co-authored over 300 publications, with a large proportion of them concentrating on real-time systems and the Ada programming language. Burns has been actively involved in the creation of the Ravenscar profile, a subset of Ada's tasking model, designed to enable the analysis of real-time programs for their timing properties.
In 2006, Alan Burns was awarded the Annual Technical Achievement Award for technical achievement and leadership by the IEEE Technical Committee on Real-time Systems. In 2009, he was elected Fellow of the Royal Academy of Engineering.
He is also a Fellow of the British Computer Society (BCS) and the Institution of Engineering and Technology (IET), and a Fellow of the Institute of Electrical and Electronics Engineers (IEEE).
Books
Alan Burns has written a number of computer science books.
References
External links
Alan Burns departmental home page
Personal home page
Year of birth missing (living people)
Living people
Academics of the University of York
English computer scientists
Computer science writers
Fellows of the British Computer Society
Fellows of the Institution of Engineering and Technology
Fellows of the Royal Academy of Engineering
Senior Members of the IEEE |
https://en.wikipedia.org/wiki/Influence%20diagram | An influence diagram (ID) (also called a relevance diagram, decision diagram or a decision network) is a compact graphical and mathematical representation of a decision situation. It is a generalization of a Bayesian network, in which not only probabilistic inference problems but also decision making problems (following the maximum expected utility criterion) can be modeled and solved.
ID was first developed in the mid-1970s by decision analysts with an intuitive semantic that is easy to understand. It is now adopted widely and becoming an alternative to the decision tree which typically suffers from exponential growth in number of branches with each variable modeled. ID is directly applicable in team decision analysis, since it allows incomplete sharing of information among team members to be modeled and solved explicitly. Extensions of ID also find their use in game theory as an alternative representation of the game tree.
Semantics
An ID is a directed acyclic graph with three types (plus one subtype) of node and three types of arc (or arrow) between nodes.
Nodes:
Decision node (corresponding to each decision to be made) is drawn as a rectangle.
Uncertainty node (corresponding to each uncertainty to be modeled) is drawn as an oval.
Deterministic node (corresponding to special kind of uncertainty that its outcome is deterministically known whenever the outcome of some other uncertainties are also known) is drawn as a double oval.
Value node (corresponding to each component of additively separable Von Neumann-Morgenstern utility function) is drawn as an octagon (or diamond).
Arcs:
Functional arcs (ending in value node) indicate that one of the components of additively separable utility function is a function of all the nodes at their tails.
Conditional arcs (ending in uncertainty node) indicate that the uncertainty at their heads is probabilistically conditioned on all the nodes at their tails.
Conditional arcs (ending in deterministic node) indicate that the uncertainty at their heads is deterministically conditioned on all the nodes at their tails.
Informational arcs (ending in decision node) indicate that the decision at their heads is made with the outcome of all the nodes at their tails known beforehand.
Given a properly structured ID:
Decision nodes and incoming information arcs collectively state the alternatives (what can be done when the outcome of certain decisions and/or uncertainties are known beforehand)
Uncertainty/deterministic nodes and incoming conditional arcs collectively model the information (what are known and their probabilistic/deterministic relationships)
Value nodes and incoming functional arcs collectively quantify the preference (how things are preferred over one another).
Alternative, information, and preference are termed decision basis in decision analysis, they represent three required components of any valid decision situation.
Formally, the semantic of influence diagram is based on sequential construct |
https://en.wikipedia.org/wiki/General%20Data%20Format%20for%20Biomedical%20Signals | The General Data Format for Biomedical Signals is a scientific and medical data file format. The aim of GDF is to combine and integrate the best features of all biosignal file formats into a single file format.
The original GDF specification was introduced in 2005 as a new data format to overcome some of the limitations of the European Data Format for Biosignals (EDF). GDF was also designed to unify a number of file formats which had been designed for very specific applications (for example, in ECG research and EEG analysis). The original specification included a binary header, and used an event table. An updated specification (GDF v2) was released in 2011 and added fields for additional subject-specific information (gender, age, etc.) and utilized several standard codes for storing physical units and other properties. In 2015, the Austrian Standardization Institute made GDF an official Austrian Standard https://shop.austrian-standards.at/action/en/public/details/553360/OENORM_K_2204_2015_11_15, and the revision number has been updated to v3.
The GDF format is often used in brain–computer interface research. However, since GDF provides a superset of features from many different file formats, it could be also used for many other domains.
The free and open source software BioSig library provides implementations for reading and writing of GDF in GNU Octave/MATLAB and C/C++. A lightweight C++ library called libGDF is also available and implements version 2 of the GDF format.
See also
List of file formats
External links
GDF v2.0 specification
OeNORM K2204:2015
References
Bioinformatics
Standards for electronic health records
Computer file formats |
https://en.wikipedia.org/wiki/Belle%20and%20Sebastian%20%28Japanese%20TV%20series%29 | is an anime adaption of the 1965 novel Belle et Sébastien by French author Cécile Aubry. The series ran on the Japanese network NHK from April 7, 1981 to March 24, 1982. It consists of 52 episodes and was a co-production of MK Company, Visual 80 Productions and Toho Company, Ltd.
Toshiyuki Kashiwakura was the head writer and character designs were by Shuichi Seki. The show was broadcast on French and Japanese television in 1981, with American cable network Nickelodeon picking it up in 1984. In the United Kingdom, it aired on Children's BBC in 1989 and 1990.
This anime used many staffers from Nippon Animation's World Masterpiece Theater franchise, thus the look and feel is similar to that of a WMT production even though Nippon Animation itself was not involved with this series.
The series has been aired in many countries outside Japan and has been dubbed and subtitled in English and numerous other languages. The English-language script was written by Eileen Opatut, and the series was dubbed into English by Synchro-Quebec in Montreal.
Plot
The series is about the mountain-based adventures of a young boy named Sebastian and his Pyrenean mountain dog, Belle, who live in a small village in Southern France. He has no friends because he is bullied by the other children for not having a mother. But one day, he meets a gentle white dog who has been falsely accused of attacking people. He names her Belle and they become the best of friends. To save her from being put down, he leaves his adoptive family and flees to Spain with her and his little dog, Poochie. They have many adventures as they elude the police and search for his long-lost mother.
Characters
Sebastian
Sebastian is a 9-year-old boy from a French village near the mountains. Although his age is never explicitly given, the repeated references to 'the events 9 years ago' throughout the series point to it. His name was chosen because he was born on St. Sebastian's Day. Since he was born, he has been living with his adoptive grandfather, Cecil, and Anne-Marie who is Cecil's real granddaughter. He is good-natured and energetic, but the children in town tease him because he doesn't have a real mother. Sebastian's deepest desires are to find his mother and to have a good friend.
Belle
Belle ("Jolie" in the Japanese version) is a large white Great Pyrenees who escaped into the French countryside. She is gentle and warmhearted, but her attempts to help those in need are misunderstood. She is labeled "The White Monster" and the police are constantly on her tail.
Poochie
Poochie is a little puppy who rides around in Sebastian's pocket. Although Poochie is always yapping and getting into mischief, he is a good friend to Sebastian and Belle.
Cecil
Cecil took Sebastian in as a baby and acts as his adoptive grandfather. He is a loving mentor who teaches him all he knows about the mountains and the wilderness.
Anne-Marie
Anne-Marie is Cecil's biological granddaughter. She has helped care fo |
https://en.wikipedia.org/wiki/List%20of%20Teenage%20Mutant%20Ninja%20Turtles%20%282003%20TV%20series%29%20episodes | This is a list of episodes of the Teenage Mutant Ninja Turtles 2003 TV series. The series debuted on February 8, 2003 on the Fox Network as part of Fox's 4Kids TV Saturday morning lineup and ended on February 28, 2009. The series was produced by Mirage Studios, which owned one third of the rights to the show.
Series overview
Series
Season 1 (2003)
Teenage Mutant Ninja Turtles' first season originally aired between February 8, 2003 and November 1, 2003, beginning with the "Things Change" episode. The episodes were released in two separate volumes, the first on May 22, 2007 with twelve episodes, and the second on September 18, 2007 with fourteen episodes.
Season 2 (2003–04)
The Shredder returns in season 2 and is revealed to be an Utrom named Ch'rell. Karai, the daughter of the Shredder makes her first appearance in this season.
Season 3 (2004–05)
Many of the Ninja Turtles' enemies return in season 3. This is the final season that includes Utrom Shredder.
Season 4 (2005–06)
For the entire season Karai is the leader of the Foot Clan. Hun controls the Purple Dragons. New enemies are seen in this season.
Season 5: Ninja Tribunal (2006)
To try to increase interest in the series, Fox aired the "Fast Forward" season on commercial TV in 2006. 4Kids Entertainment later signed a deal with Comcast and the season began airing on Comcast-On-Demand in August 2006; however, after airing five episodes, the airing was canceled. Fox later aired the "Membership Drive" episode on March 24, 2007, which was the first episode of the season to air on regular television. 4Kids TV started showing "The Ninja Tribunal" and the 12 completed episodes of this season on February 9, 2008. The season was promoted as the "Lost Episodes"
Season 6: Fast Forward (2006–07)
The sixth season, subtitled Fast Forward, originally aired between July 29, 2006 and October 27, 2007, beginning with the "Future Shellshock" episode. It includes new designs for all returning characters.
Season 7: Back to the Sewer (2008–09)
For most of the final season of the series, subtitled Back to the Sewer, the Shredder of the virtual world of Cyberspace is the main villain, and Master Splinter is trapped deep within virtual limbo with a desperate Donatello resolved to restore his real world form.
Mayhem from Mutant Island
Starting March 7, 2009, a series of 13 shorts, called "chapters", ranging from 90 seconds to two minutes in length, began airing on The CW4Kids during episodes of TMNT: Back to the Sewer and Chaotic: M'arrillian Invasion. They were streamed on the 4Kids website a week in advance of airing them on television. The episodes comprise a single story called "Mayhem from Mutant Island." On March 27, 2010 the 13 shorts were re-aired complied together as a single episode titled "Mayhem from Mutant Island".
Television film
A direct to TV and DVD movie based on the series was produced by 4Kids Entertainment; it aired on The CW4Kids on November 21, 2009.
Home releases
Reception
The |
https://en.wikipedia.org/wiki/Rope%20%28data%20structure%29 | In computer programming, a rope, or cord, is a data structure composed of smaller strings that is used to efficiently store and manipulate a very long string. For example, a text editing program may use a rope to represent the text being edited, so that operations such as insertion, deletion, and random access can be done efficiently.
Description
A rope is a type of binary tree where each leaf (end node) holds a string and a length (also known as a "weight"), and each node further up the tree holds the sum of the lengths of all the leaves in its left subtree. A node with two children thus divides the whole string into two parts: the left subtree stores the first part of the string, the right subtree stores the second part of the string, and a node's weight is the length of the first part.
For rope operations, the strings stored in nodes are assumed to be constant immutable objects in the typical nondestructive case, allowing for some copy-on-write behavior. Leaf nodes are usually implemented as basic fixed-length strings with a reference count attached for deallocation when no longer needed, although other garbage collection methods can be used as well.
Operations
In the following definitions, N is the length of the rope.
Collect leaves
Definition: Create a stack S and a list L. Traverse down the left-most spine of the tree until you reach a leaf l', adding each node N to S. Add l' to L. The parent of l' (p) is at the top of the stack. Repeat the procedure for p's right subtree.
final class InOrderRopeIterator implements Iterator<RopeLike> {
private final Deque<RopeLike> stack;
InOrderRopeIterator(@NonNull RopeLike root) {
stack = new ArrayDeque<>();
var c = root;
while (c != null) {
stack.push(c);
c = c.getLeft();
}
}
@Override
public boolean hasNext() {
return stack.size() > 0;
}
@Override
public RopeLike next() {
val result = stack.pop();
if (!stack.isEmpty()) {
val parent = stack.pop();
val right = parent.getRight();
if (right != null) {
stack.push(right);
var cleft = right.getLeft();
while (cleft != null) {
stack.push(cleft);
cleft = cleft.getLeft();
}
}
}
return result;
}
}
Rebalance
Definition: Collect the set of leaves L and rebuild the tree from the bottom-up.
static boolean isBalanced(RopeLike r) {
val depth = r.depth();
if (depth >= FIBONACCI_SEQUENCE.length - 2) {
return false;
}
return FIBONACCI_SEQUENCE[depth + 2] <= r.weight();
}
static RopeLike rebalance(RopeLike r) {
if (!isBalanced(r)) {
val leaves = Ropes.collectLeaves(r);
return merge(leaves, 0, leaves.size());
}
return r;
}
static RopeLike merge(List<RopeLike> leaves) {
return merge(leaves, 0, leaves.size());
}
static RopeLike merge(List<RopeLike> leaves, int start, int end) {
int range = end - start;
if (range == 1) {
return leaves.get( |
https://en.wikipedia.org/wiki/Peter%20Norton%20Computing | Peter Norton Computing, Inc., was a software company founded by Peter Norton. The first and best known software package it produced was Norton Utilities. Another successful software package was Norton Commander, especially the DOS version. In 1990, the company was acquired by Symantec. The acquired company became a division of Symantec and was renamed Peter Norton Computing Group. Most of Norton Computing's 115 employees were retained.
The Symantec merger helped Norton Computing regain the market share it was losing to competitors, especially Central Point Software. Norton Computing's revenues tripled between June 1990 and September 1991, and by November it appeared to have regained the market lead over Central Point.
History
Peter Norton founded the company in 1982 with $30,000 and an IBM computer. The company was a pioneer in DOS-based utilities software. Its 1982 introduction of the Norton Utilities included Norton's UNERASE tool to retrieve erased data from DOS disks.
In 1984, Norton Computing reached $1 million in revenue, and version 3.0 of the Norton Utilities was released. Norton had three clerical people working for him. He was doing all of the software development, all of the book writing, all of the manual writing and running the business. The only thing he wasn't doing was stuffing the packages. He hired his fourth employee and first programmer, Brad Kingsbury, in July 1985. John Socha, the author of Norton Commander until 1989, was hired shortly after. From November 1985 until April 1986 Warren Woodford worked at Norton Computing and created Norton Guides. In late 1985, Norton hired a business manager to take care of the day-to-day operations.
In 1985, Norton Computing produced the Norton Editor, a programmer's text editor created by Stanley Reifel, and Norton Guides, a terminate-and-stay-resident program which showed reference information for assembly language and other IBM PC internals, but could also display other reference information compiled into the appropriate file format. Norton Commander, a file managing tool for DOS, was introduced in 1986. In this year PNCI reached $5 million in revenues with Norton Utilities still bringing the largest parts.
PNC software launched prior to Symantec acquisition
Norton Utilities (1982) (✓ Merged with Norton System Works)
Norton Editor (1985)
Norton Guides (1985)
Norton Commander (1986) ✓
Norton Backup (1990) ✓
Norton Utilities for Macintosh (1990) ✓
✓ denotes software that continues to be published after the acquisition by Symantec. (Check listed for standalone and integrated components within packages)
PNC software launched after Symantec acquisition
Norton AntiVirus (NAV)
Norton AntiVirus for Mac (NAVMAC)
Norton AntiVirus (Windows) (NavW)
Norton CleanSweep (NCS)
Norton Crashguard (NCG)
Norton Desktop for DOS (NDD)
Norton Desktop for Apple (NDA)
Norton Desktop for Windows (NDW)
Norton Internet Security (NIS)
Norton Internet Security for Macintosh (NISMAC)
Norton Sys |
https://en.wikipedia.org/wiki/Mergers%20%26%20Acquisitions | Mergers & Acquisitions is a real-time B2B community, featuring a monthly magazine, daily enewsletter, conferences and member gatherings that provide news, commentary, data, analysis and community around the burgeoning middle market, providing analysis regarding private equity and cross-border mergers and acquisitions.
Mergers & Acquisitions was founded Mergers & Acquisitions Journal in 1965 by Stanley Foster Reed in Washington, D.C. who in later years wrote and published The Art of M&A with his daughter. Alexandra Lajoux. It was operated by several different companies prior to its current owner, Middle Market Information LLC. The brand's editor in chief since 2011 has been Mary Kathleen Flynn.
In addition to news and analysis about middle market M&A, Mergers & Acquisitions publishes numerous annual, monthly and weekly features and special reports that spotlight important deals and the people and firms who made them happen. These include the Most Influential Women in Mid-Market M&A, the Annual Mid-Market Awards and Dealmakers of the Year, Rising Stars of Private Equity, and M&A Most Innovative Firms.
References
External links
Monthly magazines published in the United States
Business magazines published in the United States
Magazines established in 1965
Magazines published in New York City |
https://en.wikipedia.org/wiki/Percy%20Ludgate | Percy Edwin Ludgate (2 August 1883 – 16 October 1922) was an Irish amateur scientist who designed the second analytical engine (general-purpose Turing-complete computer) in history.
Life
Ludgate was born on 2 August 1883 in Skibbereen, County Cork, to Michael Ludgate and Mary McMahon. In the 1901 census, he is listed as Civil Servant National Education (Boy Copyist) in Dublin. In the 1911 census, he is also in Dublin, as a Commercial Clerk (Corn Merchant). He studied accountancy at Rathmines College of Commerce, earning a gold medal based on the results his final examinations in 1917. At some date before or after then, he joined Kevans & Son, accountants.
Work on analytical engine
It seems that Ludgate worked as a clerk for an unknown corn merchants, in Dublin, and pursued his interest in calculating machines at night. Charles Babbage in 1843 and Ludgate in 1909 designed the only two mechanical analytical engines before the electromechanical analytical engine of Leonardo Torres Quevedo of 1920 and its few successors, and the six first-generation electronic analytical engines of 1949.
Working alone, Ludgate designed an analytical engine while unaware of Babbage's designs, although he later went on to write about Babbage's machine. Ludgate's engine used multiplication as its base mechanism (unlike Babbage's which used addition). It incorporated the first multiplier-accumulator, and was the first to exploit a multiplier-accumulator to perform division, using multiplication seeded by reciprocal, via the convergent series .
Ludgate's engine also used a mechanism similar to slide rules, but employing his unique discrete Logarithmic Indexes (now known as Irish logarithms), and provided a very novel memory using concentric cylinders, storing numbers as displacements of rods in shuttles. His design featured several other novel features, including for program control (e.g., preemption and subroutines – or microcode, depending on viewpoint). The design is so different from Babbage's as to be a second type of analytical engine, preceding the third (electromechanical) and fourth (electronic) types. The engine's precise mechanism is unknown as the only written accounts which survive do not detail its workings, although he stated in 1914 that "[c]omplete descriptive drawings of the machine exist, as well as a description in manuscript" – these have never been found.
Ludgate was one of a few independent workers in the field of science and mathematics. His inventions were worked on outside a lab. He worked on them only part-time, often until the early hours of the morning. Many publications refer to him as an accountant, but that came eight years after his 1909 analytical engine paper. Little is known about his personal life, as his only records are his scientific writings. Until 2016 the best source of information about Ludgate and his significance lie in the work of Professor Brian Randell. As from then, a further investigation is underway at Trinit |
https://en.wikipedia.org/wiki/Bob%20McDonald%20%28science%20journalist%29 | Bob McDonald OC (born January 25, 1951) is a Canadian author and science journalist. He is the national science commentator for CBC Television and CBC News Network (formerly Newsworld), and since 1992 has been the host of a weekly radio science show, Quirks & Quarks which draws approximately 800,000 listeners each week.
Career
In 1972, with no formal academic training, he began his science communication career as a demonstrator at the Ontario Science Centre, and eventually travelled to California to watch the live action of NASA's Voyager 2 space probe launch. Upon returning to Canada, he was in great demand to talk about the missions and eventually became the regular science correspondent for a number of shows.
From 1986 to 1992, he was the host and one of the producers of Wonderstruck, a Gemini Award winning science program for children. Over the years he has hosted a variety of other science or technology themed specials and documentaries, including the special The Greatest Canadian Invention.
In 1992, he became the host of the weekly CBC Radio science program "Quirks & Quarks," taking over from Jay Ingram. The show is among the most popular on the network, and is also heard on Sirius XM Radio as well as a number of public radio stations in the United States.
On September 8, 2005, McDonald premiered a new three-season, 39-part series on TVOntario called Heads Up!, which he both wrote and hosted. Heads Up! was nominated for Gemini awards for best children's TV program and best writing for a children's TV program in August 2006, and best writing for a children's or youth program or series and best host in a preschool, children's or youth program or series in August 2008. He was awarded the Gemini for best host in a preschool, children's or youth program or series in October 2008. McDonald has written a number of books including Wonderstruck, Wonderstruck II and Measuring the Earth with a Stick: Science as I've Seen It, which was short-listed for the Canadian Science Writers Association book award.
Honours
McDonald received the 2001 Michael Smith Award for Science Promotion, from NSERC, the 2002 Sandford Fleming Medal from the Royal Canadian Institute, and the 2005 McNeil Medal for the Public Awareness of Science from the Royal Society of Canada completing the "triple crown" of awards for science communication in Canada. He has been honoured for his work by the University of Toronto, Western University in London, Ontario, the University of Guelph, Laurentian University in Sudbury, Carleton University in Ottawa, McMaster University, the University of Calgary, Athabasca University in Alberta and the University of Winnipeg which each granted him honorary doctorates. McDonald was granted an Honorary Diploma in Environment, Media and Technology Studies from Niagara College on June 16, 2011, and an honorary diploma from Loyalist College on June 10, 2011.
In 2010, McDonald was initiated as an honorary life member of the Sigma Xi honour soci |
https://en.wikipedia.org/wiki/SAOL | SAOL may stand for:
Svenska Akademiens ordlista, the normative dictionary for Swedish
Structured Audio Orchestra Language, a computer language for describing audio effects, part of MPEG-4
Saol, a free monthly newspaper in the Irish language |
https://en.wikipedia.org/wiki/MBASIC | MBASIC is the Microsoft BASIC implementation of BASIC for the CP/M operating system. MBASIC is a descendant of the original Altair BASIC interpreters that were among Microsoft's first products. MBASIC was one of the two versions of BASIC bundled with the Osborne 1 computer. The name "MBASIC" is derived from the disk file name MBASIC.COM of the BASIC interpreter.
Environment
MBASIC version 5 required a CP/M system with at least 28 kB of random access memory (RAM) and at least one diskette drive.
Unlike versions of Microsoft BASIC-80 that were customized by home computer manufacturers to use the particular hardware features of the computer, MBASIC relied only on the CP/M operating system calls for all input and output. Only the CP/M console (screen and keyboard), line printer, and disk devices were available.
MBASIC in the uncustomized form had no functions for graphics, color, joysticks, mice, serial communications, networking, sound, or even a real-time clock function. MBASIC did not fully support the features of the host CP/M operating system, for example, it did not support CP/M's user areas for organizing files on a diskette. Since CP/M systems were typically single-user and stand alone, there was no provision for file or record locking, or any form of multitasking. Apart from these limitations, MBASIC was considered at the time to be a powerful and useful implementation of BASIC.
Features
Language system
MBASIC is an interpreter. Program source text was stored in memory in tokenized form, with BASIC keywords replaced by one-byte tokens which saved memory space and speeded execution. Any line prefixed with a line number was stored as program text; BASIC statements not prefixed with a line number were executed immediately as commands. Programs could be listed on the screen for editing, or saved to disk in either a compressed binary format or as plain ASCII text. Every source line was identified with a number, which could be used as the target of a GOTO or GOSUB transfer. Only line editing commands were provided. It was often beneficial to save a program as plain text and edit it with a full featured editor.
Program text, variables, disk buffers and the CP/M operating system itself all had to share the 64 kilobyte address space of the 8080 processor. Typically when first starting MBASIC there would be less than 32 kB memory available for programs and data, even on a machine equipped with a full 64 kilobytes of RAM. Comment lines, prefixed with the REM keyword or an apostrophe, could be placed in the program text but took up valuable memory space, which discouraged BASIC users from fully documenting their code. To allow larger and more complex programs to be run, later versions of MBASIC supported functions that allowed portions of program text to be read in and executed under program control (the " CHAIN " and MERGE statements). No support for "shell" command execution was provided, though this functionality could be duplicated by a |
https://en.wikipedia.org/wiki/Fujitsu%20VP2000 | The VP2000 was the second series of vector supercomputers from Fujitsu. Announced in December 1988, they replaced Fujitsu's earlier FACOM VP Model E Series. The VP2000 was succeeded in 1995 by the VPP300, a massively parallel supercomputer with up to 256 vector processors.
The VP2000 was similar in many ways to their earlier designs, and in turn to the Cray-1, using a register-based vector processor for performance. For additional performance the vector units supported a special multiply-and-add instruction that could retire two results per clock cycle. This instruction "chain" is particularly common in many supercomputer applications.
Another difference is that the main scalar units of the processor ran at half the speed of the vector unit. According to Amdahl's Law computers tend to run at the speed of their slowest unit, and in this case unless the program spent most of its time in the vector units, the slower scalar performance would make it 1/2 the performance of a Cray-1 at the same speed. The reason for this seemingly odd "feature" is unclear.
One of the major complaints about the earlier VP series was their limited memory bandwidth—while the machines themselves had excellent performance in the processors, they were often starved for data. For the VP2000 series this was addressed by adding a second load/store unit to the scalar units, doubling memory bandwidth.
Several versions of the machines were sold at different price points. The low-end VP2100 ran at an 8 ns cycle time and delivered only 0.5 GFLOPS (about 4-8 times the performance of a Cray), while the VP2200 and VP2400 decreased the cycle time to 4 ns and delivered between 1.25 and 2.5 GFLOPS peak. The high-end VP2600 ran at 3.2 ns and delivered 5 GFLOPS. All of the models came in the /10 versions with a single scalar processor, or the /20 with a second, while the 2200 and 2400 also came in a /40 configuration with four. Due to the additional load/store units, adding additional scalar units improved performance by increasing memory bandwidth, as well as allowing several programs to run at the same time and thereby increase the chance there was something to process on the vector unit. Each unit is said to increase performance 1.5 times, allowing the VP2400/40 to match the performance of the earlier VP2600/20.
The machines were supplied with either the Unix-compatible UXP/M or the MVS-compatible VSP/S operating systems, both supplied by Amdahl. The later was used for Fortran programs while the former was typically used for C, and vectorizing compilers were supplied for both languages.
Like most companies, Fujitsu turned to massive parallelism for future machines, and the VP2000 family were not on the market for very long. Nevertheless, over 100 were sold, and in July 1993, there were 180 installed.
References
Vector supercomputers
Fujitsu supercomputers |
https://en.wikipedia.org/wiki/Fujitsu%20VP | The Fujitsu FACOM VP is a series of vector supercomputers designed, manufactured, and marketed by Fujitsu. Announced in July 1982, the FACOM VP were the first of the three initial Japanese commercial supercomputers, followed by the Hitachi HITAC S-810 in August 1982 and the NEC SX-2 in April 1983.
Context in the supercomputer market
The FACOM VP were sold until they were replaced by the VP2000 family in 1990. Developed with funding from the Ministry of International Trade and Industry, the FACOM VP was part of an effort designed to wrest control of the supercomputer market from the collection of small US-based companies like Cray Research. The FACOM VP was marketed in Japan by Fujitsu, where the majority of installations were located. Amdahl marketed the systems in the US and Siemens in Europe. The ending of the cold war during this period made the market for supercomputers dry up almost overnight, and the Japanese firms decided that their mass-production capabilities were better spent elsewhere.
Development
Fujitsu had built a prototype vector co-processor known as the F230-75, which was installed attached to their own mainframe machines in the Japanese Atomic Energy Commission and National Aerospace Laboratory in 1977. The processor was similar in most ways to the famed Cray-1, but did not have vector chaining capabilities and was therefore somewhat slower. Nevertheless, the machines were rather inexpensive, and during the late 1970s supercomputers were seen as a source of national pride, and an effort started to commercialize the design by combining it with a scalar processor to create an all-in-one design.
The result was the VP-100 and VP-200, announced in July 1982. These two models differed primarily in clock rates. Lower-end models were spun off as the VP-30 and VP-50. In 1986 a two-pipeline version was released as the VP-400. The next year the entire series was updated with the addition of a new vector unit that supported a multiply-and-add unit that could retire two results per clock cycle. This resulted in the "E series", VP-30E through VP-400E.
Issues with the design
One problem with the design was the limited memory bandwidth as a result of having only one load-store unit. Even on the top-end VP-400E it could drive only 4.57 GB/s peak, limiting the maximum performance to only 0.5 GFLOPS for 64-bit operands. US designs focused on this problem in the early 1980s, and the contemporary Cray-2 could drive about 2 GB/s per processor, with up to four processors.
References
R.W. Hockney; C.R. Jesshope (1988). Parallel Computers 2: Architecture, Programming and Algorithms. CRC Press. pp. 191–196.
Computer-related introductions in 1982
1982 in computing
1982 in Japan
Fujitsu supercomputers
MITI projects
Vector supercomputers |
https://en.wikipedia.org/wiki/Beat%20the%20Geeks | Beat the Geeks is an American television game show that aired on Comedy Central from 2001 to 2002. The show was rerun on The Comedy Network in Canada.
On the show, contestants face off in trivia matches against a panel of three resident "geeks" who are well-versed in music, movies, and television, as well as a fourth guest geek with an alternate area of expertise which varies from episode to episode. The object is to outsmart the geek at their own subject; as a handicap, the geeks are given questions of considerably greater difficulty than the contestants. Beat the Geeks was taped at the Hollywood Center Studios.
Rules
First round
In the first season, the three contestants competed against each other to answer eight toss-up questions, two from each category; the geeks did not play in this round. The first four questions (one per category) were worth 5 points each, and the second four were worth 10 points each. Occasionally, the geeks would give a fact after the question.
In the second season, four pairs of questions were asked, one in each geek's category. The first question of each pair was a toss-up among the contestants, worth 10 points. The contestant who answered correctly then played the second toss-up against the relevant Geek. If the contestant answered correctly or if the Geek missed, the contestant scored 10 points; if the contestant missed or if the geek answered correctly, the contestant lost 5 points.
In both seasons, the lowest scorer at the end of the round was eliminated. In the event of a tie for low score, a question with a numerical answer was asked and the contestants wrote down their guesses. The one who came closer to the correct answer without going over remained in the game; if both were over, the closer guess won.
Second round
The remaining two contestants each play a head-to-head challenge against the geek of their choice in order to win the geek's medal. In season 1, if the contestants begin the round tied, they are asked a toss-up question to determine who plays first. In season 2, the winner of a coin toss during a commercial break determined who plays first. Otherwise, the player with the most points started. Once a geek has lost that medal to a contestant, that geek cannot be challenged again until the final round.
Season 1
In the first season, four questions are asked, alternating between the contestant and the geek, whose questions are much more difficult. If the geek gives a wrong answer, the contestant wins the challenge, scores points, and gets to wear the geek's medal for the rest of the game. If the contestant misses a question, the challenge ends and the opponent may score 10 points by giving the correct answer. On occasion, if a challenge ends due to the contestant missing the question, the challenged geek will be asked the more difficult question to show off.
If all four questions are answered correctly, a "geek-off" is played to decide the challenge. The player must name as many items as in a give |
https://en.wikipedia.org/wiki/Evans%20%26%20Sutherland%20ES-1 | The ES-1 was Evans & Sutherland's abortive attempt to enter the supercomputer market. It was aimed at technical and scientific users who would normally buy a machine like a Cray-1 but did not need that level of power or throughput for graphics-heavy workloads. About to be released just as the market was drying up in the post-cold war military wind-down, only a handful were built and only two sold.
Background
Jean-Yves Leclerc was a computer designer who was unable to find funding in Europe for a high-performance server design. In 1985 he visited Dave Evans, his former PhD. adviser, looking for advice. After some discussion he eventually convinced him that since most of their customers were running E&S graphics hardware on Cray Research machines and other supercomputers, it would make sense if E&S could offer their own low-cost platform instead.
Eventually a new Evans & Sutherland Computer Division, or ESCD, was set up in 1986 to work on the design. Unlike the rest of E&S's operations which are headquartered in Salt Lake City, Utah, it was felt that the computer design would need to be in the "heart of things" in Silicon Valley, and the new division was set up in Mountain View, California.
Basic design
Instead of batch mode number crunching, the design would be tailored specifically to interactive use. This would include a built-in graphics engine and 2 GB of RAM, running BSD Unix 4.2. The machine would offer performance on par with contemporary Cray and ETA Systems.
8 × 8 crossbar
The basic idea of Leclerc's system was to use an 8×8 crossbar switch to connect eight custom CMOS CPUs together at high speed. An extra channel on the crossbar allowed it to be connected to another crossbar, forming a single 16-processor unit. The units were 16-sized (instead of 8) in order to fully utilize a 16-bank high-speed memory that had been designed along with the rest of the system. Since memory was logically organized on the "far side" of the crossbars, the memory controller handled many of the tasks that would normally be left to the processors, including interrupt handling and virtual memory translation, avoiding a trip through the crossbar for these housekeeping tasks.
The resulting 16-unit processor/memory blocks could then be connected using another 8×8 crossbar, creating a 128-processor machine. Although the delays between the 16-unit blocks would be high, if the task could be cleanly separated into units the delay would not have a huge effect on performance. When data did have to be shared across the banks the system balanced the requests; first the "leftmost" processor in the queue would get access, then the "rightmost". Processors added their requests onto the proper end of the queue based on their physical location in the machine. It was felt that the simplicity and speed of this algorithm would make up for the potential gains of a more complex load-balancing system.
Instruction pipeline
In order to allow the system to work even with the high i |
https://en.wikipedia.org/wiki/FreePPP | FreePPP is a Point to Point Protocol (PPP) implementation for computers running the classic Mac OS. FreePPP was widely considered the first working and most stable version of PPP for Apple Macintosh and led many PPP internet service providers to support Macintosh users for the first time.
Besides the overall stability, usability was a large factor in the popularity of this implementation. A menu bar icon was introduced that gave users easy access to common tasks such as dialing and disconnecting. Modems were "auto-detected", keeping users from having to find and configure an init string for their modem (a common stumbling block for users). FreePPP was installed by a "lite" version of the commercial Internet Setup Monkey product, whose producer Rockstar Studios was a primary contributor to FreePPP. The installer included cartoon images of a monkey installing software on the computer.
Early history
FreePPP 1.0, the first version, was simply a repackaging of MacPPP from Merit Network; MacPPP developed for the most part by Larry Blunk. MacPPP was actually the first PPP for the Mac OS but was unstable and prone to error. The source code was made freely available and various users released fixes for common bugs. Steve Dagley aggregated most of those patches to MacPPP and added ISDN functionality. He re-released it as FreePPP in early 1994.
Adoption by Apple
FreePPP 2.5, the most popular version, was the result of Apple Computer getting involved in the development of MacPPP. Steve Dagley contacted Apple about his work with FreePPP and convinced Apple to use it for its Internet software, Cyberdog. An Apple engineer, Richard Reynolds, rewrote most of FreePPP, greatly improving stability.
Richard left Apple to form Rockstar Studios along with Brian Chen, creator of the immensely popular screensaver from Berkeley Systems, "After Dark". Apple allowed Richard to take his work with him to Rockstar and continue it. Consequently, Steve Dagley and Richard (along with Rockstar) created The FreePPP Group to manage the distribution and licensing of FreePPP. Steve Dagley developed an all-new control panel that included location management. Rockstar Studios contributed PPP Menu and The Internet Setup Monkey. The Internet Setup Monkey included a cartoon monkey, developed by Matt Small, that appears to tear apart a computer, install FreePPP then put it back together. Rockstar sold this installer to Internet Service providers. This was a time when most operating systems did not come with any form of TCP networking support, requiring separate installation before its users could connect to the Internet. Installation and configuration issues were a common problem for both users and ISPs.
Apple released a version of FreePPP under the old name MacPPP and included it in a few minor System 7.5.x releases. Open Transport eventually included a completely new PPP developed by Apple directly into Mac OS but many users choose FreePPP for its advanced and easy to use features. |
https://en.wikipedia.org/wiki/List%20of%20interactive%20geometry%20software | Interactive geometry software (IGS) or dynamic geometry environments (DGEs) are computer programs which allow one to create and then manipulate geometric constructions, primarily in plane geometry. In most IGS, one starts construction by putting a few points and using them to define new objects such as lines, circles or other points. After some construction is done, one can move the points one started with and see how the construction changes.
History
The earliest IGS was the Geometric Supposer, which was developed in the early 1980s. This was soon followed by Cabri in 1986 and The Geometer's Sketchpad.
Comparison
There are three main types of computer environments for studying school geometry: supposers, dynamic geometry environments (DGEs) and Logo-based programs. Most are DGEs: software that allows the user to manipulate ("drag") the geometric object into different shapes or positions. The main example of a supposer is the Geometric Supposer, which does not have draggable objects, but allows students to study pre-defined shapes. Nearly all of the following programs are DGEs. For a related, comparative physical example of these algorithms, see Lenart Sphere.
License and platform
The following table provides a first comparison of the different software according to their license and platform.
3D Software
General features
The following table provides a more detailed comparison :
Macros
Features related to macro constructions: (TODO)
Loci
Loci features related to IGS: (TODO)
Proof
We detail here the proof related features. (TODO)
Measurements and calculation
Measurement and calculation features related to IGS: (TODO)
Graphics export formats
Object attributes
2D programs
C.a.R.
C.a.R. is a free GPL analog of The Geometer's Sketchpad (GSP), written in Java.
Cabri
Cabri
Cabri was developed by the French school of mathematics education in Grenoble (Laborde, 1993)
CaRMetal
CaRMetal is a free GPL software written in Java. Derived from C.a.R., it provides a different user interface.
Cinderella
Cinderella, written in Java, is very different from The Geometer's Sketchpad. The later version Cinderella.2 also includes a physics simulation engine and a scripting language. Also, it now supports macros, line segments, calculations, arbitrary functions, plots, etc. Full documentation is available online.
Dr Genius
Dr Genius was an attempt to merge Dr. Geo and the Genius calculator.
Dr. Geo
Dr. Geo is a GPL interactive software intended for younger students (7-15). The later version, Dr. Geo II, is a complete rewrite of Dr. Geo, for the Squeak/Smalltalk environment.
GCLC
GCLC is a dynamic geometry tool for visualizing and teaching geometry, and for producing mathematical illustrations. In GCLC, figures are described rather than drawn. This approach stresses the fact that geometrical constructions are abstract, formal procedures and not figures. A concrete figure can be generated on the basis of the abstract desc |
https://en.wikipedia.org/wiki/Mainstream%20Baptists | Mainstream Baptists is a network of Baptists in fourteen U.S. states that have organized to uphold historic Baptist principles, particularly separation of church and state, and to oppose Fundamentalism and Theocratic Calvinism within the Southern Baptist Convention. As such, it is not a denomination, but rather an organization that provides resources, support, and interagency communication. Organizations/agencies considered to share Mainstream Baptists and cooperate with and support the network are listed below under External links.
Historic Baptist beliefs of Mainstream Baptists
Lordship of Christ
The heart of Baptist beliefs is the Lordship of Christ.
Christ is Lord over the individual believer, he is Lord over the church, and he is Lord over the universe and all that is in it.
Jesus Christ is the final authority in our individual lives, in our homes, in our churches, and in all our relationships with society and the world.
Our ultimate loyalty and allegiance is to God's Person, rather than to books, creeds, confessions, traditions, programs or procedures.
Salvation by Grace Through Faith
"For by grace have you been saved through faith; and that not of yourselves, it is the gift of God; not as a result of works, that no one should boast".
Baptists believe that God's love and grace is the only basis for any person's relationship with God. The individual can do nothing to earn or deserve God's love and forgiveness. Faith is not an effort or labor.
Faith is receiving God's love with an open heart and finding it transformed by God's grace.
Believer's Baptism
Baptists baptize persons only after they make a personal confession of their faith in Christ.
Baptists do not believe that a loving God condemns anyone for a sin they did not commit. Baptists do not view baptism as a remedy for original sin. Baptists do not baptize infants.
Baptists practice baptism by totally immersing persons in water, rather than by sprinkling, pouring, or anointing persons with water.
Baptism by immersion preserves the dramatic imagery of the meaning of baptism as a symbolic death, burial and resurrection. The symbolism of baptism pictures: the death, burial and resurrection of Christ who died for our sins and the believer's own death to sin, burial of a sinful nature, and resurrection to a new life in Christ.
Priesthood of All Believers and Liberty of Conscience
Baptists believe that all members are equal under God in the fellowship of the church. Jesus is the one mediator between God and humanity. Every human being has direct access to God through Christ.
Every Christian is her or his own priest in that he or she is authorized to go directly to God for forgiveness of sins and to search the scriptures with confidence of being guided by the same Spirit that inspired those who wrote the Bible.
Every Christian is a priest to others in that he or she is a member of a royal priesthood and responsible to Christ for ministering to others.
Religious Liberty and the Separatio |
https://en.wikipedia.org/wiki/14th%20Daytime%20Emmy%20Awards | The 14th Daytime Emmy Awards were held on Tuesday, June 30, 1987 to commemorate excellence in daytime programming from the previous year (1986). Telecast from 3-5 p.m. on ABC, the ceremony preempted General Hospital.
Winners in each category are in bold.
Outstanding Daytime Drama Series
All My Children
As the World Turns
Santa Barbara
The Young and the Restless
Outstanding Actor in a Daytime Drama Series
Scott Bryce (Craig Montgomery, As the World Turns)
Larry Bryggman (John Dixon, As the World Turns)
A Martinez (Cruz Castillo, Santa Barbara)
Eric Braeden (Victor Newman, The Young and the Restless)
Terry Lester (Jack Abbott, The Young and the Restless)
Outstanding Actress in a Daytime Drama Series
Susan Lucci (Erica Kane, All My Children)
Elizabeth Hubbard (Lucinda Walsh, As the World Turns)
Frances Reid (Alice Horton, Days of Our Lives)
Kim Zimmer (Reva Shayne, Guiding Light)
Marcy Walker (Eden Capwell, Santa Barbara)
Outstanding Supporting Actor in a Daytime Drama Series
Gregg Marx (Tom Hughes, As the World Turns)
Anthony Call (Herb Callison, One Life to Live)
Al Freeman, Jr. (Ed Hall, One Life to Live)
Justin Deas (Keith Timmons, Santa Barbara)
Richard Eden (Brick Wallace, Santa Barbara)
Outstanding Supporting Actress in a Daytime Drama Series
Kathleen Noone (Ellen Dalton, All My Children)
Lisa Brown (Iva Snyder, As the World Turns)
Kathleen Widdoes (Emma Snyder, As the World Turns)
Peggy McCay (Caroline Brady, Days of Our Lives)
Robin Mattson (Gina Lockridge, Santa Barbara)
Outstanding Young Man in a Daytime Drama Series
Michael E. Knight (Tad Martin, All My Children)
Brian Bloom (Dusty Donovan, As the World Turns)
Jon Hensley (Holden Snyder, As the World Turns)
Billy Warlock (Frankie Brady, Days of Our Lives)
Grant Show (Rick Hyde, Ryan's Hope)
Outstanding Ingenue in a Daytime Drama Series
Martha Byrne (Lily Walsh, As the World Turns)
Krista Tesreau (Mindy Lewis, Guiding Light)
Robin Wright (Kelly Capwell, Santa Barbara)
Jane Krakowski (T.R. Kendall, Search for Tomorrow)
Tracey E. Bregman (Lauren Fenmore, The Young and the Restless)
Outstanding Guest Performer in a Daytime Drama Series
John Wesley Shipp (Martin Ellis, Santa Barbara)
Pamela Blair (Maida Andrews, All My Children)
Terrence Mann (Jester, As the World Turns)
Celeste Holm (Clara Woodhouse and Lydia Woodhouse, Loving)
Eileen Heckart (Ruth Perkins, One Life to Live)
Outstanding Daytime Drama Series Writing
Days of our Lives
The Young and the Restless
One Life to Live
Outstanding Daytime Drama Series Directing
All My Children
Days of our Lives
As the World Turns
The Young and the Restless
Outstanding Game Show
The $25,000 Pyramid - A Bob-Sande Stewart Production for CBS (Syn. by 20th Century Fox)
Jeopardy! - A Merv Griffin Production (Syn. by KingWorld)
The Price Is Right - A Mark Goodson Production for CBS
Wheel of Fortune - A Merv Griffin Production for NBC (Syn. by KingWorld)
Outstanding Game Show Host
Bob Barker (The Price Is Right)
Dick Clark (The $25, |
https://en.wikipedia.org/wiki/AFRS | AFRS may refer to:
Armed Forces Radio Service, a predecessor of the American Forces Network
Avon Fire and Rescue Service, England
See also
AFR (disambiguation) |
https://en.wikipedia.org/wiki/IMac%20G4 | The iMac G4 is an all-in-one personal computer designed, manufactured, and sold by Apple Computer from January 2002 to August 2004. It was announced at Macworld San Francisco in January of 2002. It replaced the iMac G3 and was succeeded by the iMac G5.
The iMac G4 was the first iMac to have an LCD display built in, replacing the CRT display of previous iMacs.
Design and marketing
The iMac G4 featured an LCD mounted on an adjustable arm above a hemisphere containing a full-size, tray-loading optical drive and a fourth-generation PowerPC G4 74xx-series processor. The internals such as the hard drive and motherboard were placed in the "dome" instead of the LCD panel as it would be too heavy. The arm allowed the display to hold almost any angle around the dome-shaped bottom. The iMac G4 was sold only in white, and was not translucent like the iMac G3. The machine was sold with the ice-white Apple Pro Keyboard and Apple Pro Mouse, which were later redesigned and renamed the Apple Keyboard and Apple Mouse, respectively. Optional Apple Pro Speakers, which were better quality than the internal speakers, were also available. The Apple Pro Speakers used a unique adapter, designed to work only with a select few Apple Macintosh models.
The iMac G4 originally included both Mac OS 9 and Mac OS X, due to the machine being released in the year Mac OS 9 was discontinued. When running newer versions of Mac OS X (Tiger and Leopard), the iMac G4's GeForce4 MX GPU was not capable of Core Image rendering. This causes some minor graphical issues. One such issue would be the lack of the Dashboard ripple effect when a widget is introduced. Another would be an opaque menu bar in Mac OS X Leopard.
It was originally known as the New iMac, while the existing iMac G3 continued to be sold for several months. During this time, Apple had all but eliminated CRT displays from its product line. However, the LCD iMacs were unable to match the low price point of the iMac G3, largely due to the higher cost of the LCD technology at the time. The iMac G3 was obsolete by this point, but low-cost machines were particularly important for the education market. Because of this affordability issue, Apple created the eMac in April 2002 and ended production of the iMac G3. The iMac G4 was then marketed as the "iMac" until its discontinuation, then was retroactively labeled iMac G4 to distinguish itself from the succeeding iMac G5 in August 2004.
Apple advertised the iMac G4 as having the adjustability of a desk lamp. One of the advertisements for the machine featured it sitting in a store window "reacting" to every move made by a passer-by on the street. At the end, when the man sticks out his tongue, the iMac responds by opening its optical drive.
The internal components are housed in a 10.6" half-sphere, ice white case with a chromed stainless steel neck that supports a 15" TFT active matrix LCD display. Unlike some earlier iMac models that are convection-cooled, the iMac "Flat Panel" |
https://en.wikipedia.org/wiki/IMac%20G3 | The iMac G3, originally released as the iMac, is a series of Macintosh personal computers Apple Computer sold from 1998 to 2003. The iMac was Apple's first major product release under its CEO Steve Jobs, who had recently returned to the financially troubled company he co-founded after eleven years away. Jobs reorganized the company and simplified the product line. The iMac was designed as Apple's new consumer desktop product—an inexpensive, consumer-oriented computer that would easily connect to the Internet.
The iMac's all-in-one design is based around a cathode-ray tube display; the G3 processor, components, and connectivity were all included in a single enclosure. Apple's head of design Jony Ive and his team developed a teardrop-shaped, translucent plastic case that was a radical departure from the look of the company's previous computers. The company developed new working methods to quickly finish the computer, and new workflows they used for designing future products. The iMac G3 eschewed legacy technologies like serial ports and floppy disk drives in favor of CD-ROMs and USB ports.
Critical response to the iMac was mixed; journalists said the machine would be good for new computer users but bemoaned the lack of legacy technology, and said the mouse and keyboard were uncomfortable. Despite the reviews the iMac was an immediate commercial success, selling more than 5 million units in its lifetime and becoming Apple's fastest-selling computer. The original model was revised several times, improving the processor speed, the amount of random-access memory, hard drive space, and other capabilities. The iMac is credited with saving Apple from financial ruin, and for turning personal computers from niche, technical products to mass-consumer fashion. Other computers and consumer products appropriated the translucent plastic look, leading to legal action from Apple. The G3-based series of iMac models was suceeded by a G4-powered successor, and the iMac G3's role in education markets was replaced by the eMac.
Background
In the late 1990s, Apple Computer was experiencing severe financial difficulties. At the end of 1997, the company was selling 1.8 million Macs per year, in comparison with 4.5 million two years earlier. Apple's sales were compromised by licensed Mac systems that undercut and out-performed Apple's own products. Unable to quickly distribute its products and compete in the low-cost computer market, Apple entirely abandoned the sector.
In December 1996, Apple purchased the computer maker NeXT. NeXT founder Steve Jobs returned to Apple, the company he had co-founded and then was ousted from, as part of the deal. Apple also acquired NeXT's operating system NeXTSTEP, which would become the foundation for Apple's next-generation operating system Mac OS X. Jobs returned to Apple as an advisor but the company's board of directors dismissed CEO Gil Amelio on July 9, 1997, and Jobs replaced him as interim CEO.
Upon his return, Jobs streamli |
https://en.wikipedia.org/wiki/David%20Grierson | David Grierson (February 19, 1955 – November 20, 2004) was a Canadian radio broadcaster, best known as a host of national and local programming for CBC Radio.
He was born in Toronto in 1955 and graduated from the broadcasting program at the British Columbia Institute of Technology, as well as training as a classical clarinetist.
Broadcasting
Grierson began working in broadcasting as a radio producer and programming director for commercial radio stations in Vancouver, including CHQM-FM and CJAZ-FM.
Grierson was a weekly columnist and co-host of Sunday Arts/Entertainment, as well as a contributor to Good Rockin' Tonite and The Journal on CBC Television. His series The Performers ran on CTV and Turner Network Television.
In the late 1980s, Grierson hosted The Arts Report, CBC Stereo's national morning arts newscast. In 1991, he succeeded Bob Oxley as host of Stereo Morning, the network's main morning program, until leaving in 1992 to take a position with network station CBU in Vancouver. He worked as a staff announcer for the station until 1997, when he became the host and producer of North by Northwest, the station's weekend morning show.
In December 2000, he left NXNW to take over from Lisa Cordasco as host of CBCV-FM's On the Island, the network's morning show for Vancouver Island. He hosted On the Island until his death in 2004.
Grierson was also a contributor to other network programming including Westcoast Performance, Richardson's Roundup, Morningside, Gabereau, Sunday Morning, Prime Time, Arts National, Sunday Matinee, Vanishing Point and DiscDrive. He was also the voice of the National Research Council Time Signal.
Other activities
Grierson wrote The Expo Celebration, a retrospective book featuring the work of more than 50 of Canada's top photographers. A passion for jazz music saw him create and write a weekly column called "The Jazz Life" for the Georgia Straight, and his feature writing on music appeared in publications including Down Beat, Swing Journal, Canadian Musician and Western Living.
In 1993 and 1994, he won two successive songwriting competitions staged by the Vancouver Sun, the first time with a rewrite of Julia Ward Howe's The Battle Hymn of the Republic as a tribute to the Vancouver Folk Music Festival, and the second with a rewrite of Bob Dylan's "Blowin' in the Wind" as a song about the 1994 Vancouver Stanley Cup riot. Both songs were submitted under pseudonyms, and on both occasions he donated his prize, a family pass to the folk festival, to a family who could not otherwise afford to attend.
A frequent juror for creative competitions, Grierson was a charter member of the Writers Guild of Canada, one of the founding members of the British Columbia chapter of the Canadian Academy of Recording Arts and Sciences, and sat on the board of directors of the Vancouver Folk Music Festival.
Death
He died of an apparent heart attack on November 20, 2004.
References
1955 births
2004 deaths
Canadian talk radio hosts
Canadi |
https://en.wikipedia.org/wiki/WNBC | WNBC (channel 4) is a television station in New York City that serves as the flagship of the NBC network. It is owned and operated by the network's NBC Owned Television Stations division alongside Linden, New Jersey–licensed Telemundo station WNJU (channel 47). WNBC's studios and offices are co-located with NBC's corporate headquarters at 30 Rockefeller Plaza in Midtown Manhattan; WNJU's facilities in Fort Lee, New Jersey, also serve as WNBC's New Jersey news bureau. Through a channel sharing agreement with WNJU, the two stations transmit using WNJU's spectrum from an antenna atop One World Trade Center.
WNBC holds the distinction of being the oldest continuously operating commercial television station in the United States.
History
Experimental operations
What is now WNBC traces its history to experimental station W2XBS, founded by the Radio Corporation of America (RCA, a co-founder of the National Broadcasting Company), in 1928, just two years after NBC was founded as the first nationwide radio network. Originally a test bed for the experimental RCA Photophone theater television system, W2XBS used the low-definition mechanical television scanning system. Later it was used mostly for reception and interference tests. The call letters W2XBS meant W2XB-south, with W2XB being the call letters of the first experimental station, started a few months earlier at General Electric's (GE) main factory in Schenectady, New York, which evolved into today's WRGB. GE was the parent company of both RCA and NBC, and technical research was done at the Schenectady plant.
The station originally broadcast on the frequencies of 2.0 to 2.1 MHz. In 1929, W2XBS upgraded its transmitter and broadcast facilities to handle transmissions of 60 vertical lines at 20 frames per second, on the frequencies of 2.75 to 2.85 MHz. In 1928, Felix the Cat was one of the first images ever broadcast by television when RCA chose a papier-mâché (later Bakelite) Felix doll for an experimental broadcast on W2XBS. The doll was chosen for its tonal contrast and its ability to withstand the intense lights needed in early television. It was placed on a rotating phonograph turntable and televised for about two hours each day. The doll remained on the turntable for nearly a decade as RCA fine-tuned the picture's definition, and converted to electronic television.
The station left the air sometime in 1933 as RCA turned its attention to all-electronic cathode-ray tube (CRT) television research at its Camden, New Jersey facility, under the leadership of Dr. Vladimir K. Zworykin.
In 1935, the all-electronic CRT system was authorized as a "field test" project and NBC converted a radio studio in the RCA Building in New York City's Rockefeller Center for television use. In mid-1936, small-scale, irregularly scheduled programming began to air to an audience of some 75 receivers in the homes of high-level RCA staff, and a dozen or so sets in a closed circuit viewing room in 52nd-floor offices of the |
https://en.wikipedia.org/wiki/Artificial%20Intelligence%20%28series%29 | Artificial Intelligence is a series of albums by Warp Records released from 1992–1994 to exhibit the capabilities and sounds of electronic music. Warp described the new (post-rave electronic) music as "electronic listening music" to clarify that it was meant more for the mind than the body. The sleevenote on the 1992 compilation said "Are you sitting comfortably? Artificial Intelligence is for long journeys, quiet nights and club drowsy dawns. Listen with an open mind." The series is remarkable for its inclusion of groups and individuals who would later become leaders in modern electronic music, techno, and ambient, such as Alex Paterson, Plaid, Richard D. James, Richie Hawtin, and Autechre. Every album in the series, aside from Dimension Intrusion, has its name enclosed in parentheses on its cover.
Releases
The original AI series consisted of the following releases, listed in order of release:
Artificial Intelligence – Various Artists
Surfing on Sine Waves – Polygon Window
Bytes – Black Dog Productions
Electro-Soma – B12
Dimension Intrusion – F.U.S.E.
Ginger – Speedy J
Incunabula – Autechre
Artificial Intelligence II – Various Artists
Motion (video) – Various Artists
Background
When asked about the series in a 2016 interview with online electronic music journal Resident Advisor, Sean Booth of Autechre said that,I dunno, I didn't come up with Artificial Intelligence. You'd have to ask [Warp founder] Rob Mitchell and he's not around any more! I think it was a joke, really. There was a definite tongue-in-cheek thing going on with the AI series initially, everyone knew it was a bit silly. But we were enjoying doing it. Thing is, almost all the artists on that first AI compilation are just like us, they were regular kids, they're not intelligent people particularly. Richard [D. James] is a fucking blagger, Richie Hawtin too... I don't know how the fuck he gets away with the things he does! Alex Paterson, people like that, they're not known for being intellectually powerful, they're just fucking good musicians.
Each of the albums was released on vinyl, cassette and CD; each of the artist albums was also released on limited edition coloured or transparent vinyl. The video release Motion, released on VHS (and Laserdisc in Japan), mostly contained tracks from Artificial Intelligence II. Each release except Ginger was distributed in the United States by TVT/Wax Trax! Records.
References
Further reading
Cardew, Ben (July 2017). "Machines of loving grace: how Artificial Intelligence helped techno grow up" The Guardian.
External links
WARP Records Artificial Intelligence Series
Album series
Warp (record label) albums |
https://en.wikipedia.org/wiki/Netgear | Netgear, Inc. is an American computer networking company based in San Jose, California, with offices in about 22 other countries. It produces networking hardware for consumers, businesses, and service providers. The company operates in three business segments: retail, commercial, and as a service provider.
Netgear's products cover a variety of widely used technologies such as wireless (Wi-Fi, LTE and 5G), Ethernet and powerline, with a focus on reliability and ease-of-use. The products include wired and wireless devices for broadband access and network connectivity, and are available in multiple configurations to address the needs of the end-users in each geographic region and sector in which the company's products are sold.
As of 2020, Netgear products are sold in approximately 24,000 retail locations around the globe, and through approximately 19,000 value-added resellers, as well as multiple major cable, mobile and wireline service providers around the world.
History
Netgear was founded by Patrick Lo in 1996. Lo graduated from Brown University with a B.S. degree in electrical engineering. Prior to founding Netgear, Lo was a manager at Hewlett-Packard. Netgear received initial funding from Bay Networks.
The company was listed on the NASDAQ stock exchange in 2003.
Product range
Netgear's focus is primarily on the networking market, with products for home and business use, as well as pro-gaming, including wired and wireless technology.
Netgear also has a wide range of Wifi Range Extenders
ProSAFE switches
Netgear markets network products for the business sector, most notably the ProSAFE switch range. , Netgear provides limited lifetime warranties for ProSAFE products for as long as the original buyer owns the product. Currently focusing on Multimedia segment and business product.
Network appliances
Netgear also markets network appliances for the business sector, including managed switches and wired and wireless VPN firewalls. In 2016, Netgear released its Orbi mesh Wi-Fi System, with models for business as well as household use. The system uses a Tri-band architecture, similar to the traditional dual-band, but with a dedicated 5 GHz connection between the router and a provided satellite. The addition of a second 5 GHz channel allows the network to distribute its traffic, easing congestion caused by the increasing number of 5 GHz compatible wireless devices present in many household networks. In September 2017, Netgear exited the VPN firewall product category. At CES 2021, the company unveiled the world's first WiFi 6E router that takes advantage of the 6 GHz frequency band in addition to the 5 GHz and 2.4 GHz bands. The 6 GHz frequency increases network capacity where there is high utilization of the 5 GHz and 2.4 GHz bands.
Network-attached storage
Netgear sells NAS devices to small businesses and consumers under the product name ReadyNAS. With this storage hardware line, Netgear vies with competitors like Buffalo, Zyxel and HP. |
https://en.wikipedia.org/wiki/John%20Dykstra | John Charles Dykstra, A.S.C. (; born June 3, 1947) is an American special effects artist, pioneer in the development of the use of computers in filmmaking and recipient of three Academy Awards, among many other awards and prizes. He was one of the original employees of Industrial Light & Magic, the special effects and computer graphics division of Lucasfilm. He is well known as the special effects lead on the original Star Wars, helping bring the original visuals for lightsabers, space battles between X-wings and TIE fighters, and Force powers to the screen. He also led special effects on many other movies, including Batman Forever, Batman & Robin, Stuart Little, X-Men: First Class, Spider-Man and Spider-Man 2.
Education and early career
Dykstra was born in Long Beach, California. After studying industrial design at California State University, Long Beach (where he was a member of Phi Kappa Tau fraternity), in 1971 he landed a job working with Douglas Trumbull on Silent Running filming model effects, when Trumbull hired recent college graduates due to the film's low budget.
Star Wars
In 1975, when George Lucas was recruiting people for the special effects work on Star Wars, he approached Douglas Trumbull, but he was unavailable as he was about to start working on Steven Spielberg's Close Encounters of the Third Kind. Trumbull pointed Lucas towards Dykstra. Lucas formed his own special effects company, Industrial Light & Magic (ILM), based in warehouse premises in Van Nuys, and appointed Dykstra to supervise the new team. This led to the development of the Dykstraflex motion-controlled camera, which enabled many of the film's groundbreaking effects to be produced. The system was made possible by the availability of off-the-shelf integrated-circuit RAM at relatively low cost and secondhand VistaVision cameras.
However, tensions arose between Dykstra and Lucas, the latter complaining that too much time and money was spent on developing the digital camera systems and that the effects team did not deliver all the shots that he had wanted causing the production to run behind schedule. These tensions would reportedly culminate with Dykstra's dismissal from ILM following Lucas' return from principal photography in London. Regardless, following the release of Star Wars, Dykstra and his team won Academy Awards for best special effects and special technical achievement.
Battlestar Galactica
After Star Wars, Dykstra began working on Battlestar Galactica for Universal Studios. Supervising the special effects for the three-hour pilot episode (which was also released theatrically), Dykstra formed his own effects company called Apogee, Inc. which included several ILM employees who had worked on Star Wars. Dykstra was also given a Producer credit for the pilot of the television series. As Universal then opted to make Galactica into a weekly series, many of Dykstra's effects shots were recycled and used repeatedly throughout the show's single season run.
Afte |
https://en.wikipedia.org/wiki/PC12%20minicomputer | PC12 by Artronix was a minicomputer built with 7400-series TTL technology and ferrite core memory. Computers were manufactured at the Artronix facility in suburban St. Louis, Missouri.
The instruction set architecture was adapted from the LINC, the only significant change was to
expand addressable memory to 4K, which required addition of an origin register. It was an accumulator machine with 12-bit addresses to manipulate 12-bit data. Later versions included "origin registers" that were used to extend the addressability of memory. Arithmetic was one's complement.
For mass storage it had a LINCtape dual unit. It also used a Tektronix screen with tube memory and an ADC/DAC to capture and display images. There was an optional plotter to draw the results. To speed up the calculations it had a separate floating point unit that interfaced like any other peripheral.
It ran an operating system LAP6-PC with support for assembly language and Fortran programming and usually came with end user software for Radiation Treatment Planning (RTP), for use by a radiation therapist or radiation oncologist, and Hospital Patient Records. Software for implant dosimetry was available for the PC12. With extended hardware it became a multiuser system running MUMPS.
Latter additions included an 8" floppy disk and hard disk of larger capacity.
The PC12 initially controlled the Artronix brain scanner (computed axial tomography), but this was for prototyping.
The PC12 was also the core of an ultrasound system and a gamma camera system.
The PC12 was eventually superseded by the "Modulex" system built by Artronix around the 16-bit Lockheed SUE processor, roughly around 1976. The PC12 continued in production, but was phased out over time.
Sites which used the Artronix PC12 included the Lutheran Hospital Cancer Center in Moline, Illinois, where it was used to store the medical records of patients undergoing treatment for cancer. A 1974 paper describes the use of a PC-12 as a frontend to an IBM 360 mainframe in radiation therapy, in which the PC-12 acted as the user interface while the mainframe is used to perform complex calculations.
References
External links
Minicomputers |
https://en.wikipedia.org/wiki/Network%20seven | 7 Network, network seven, a network called 7 or Seven, or variation, may refer to:
Seven Network, an Australian television broadcast network
SEVEN Networks, an American networking, mobility, software company
Network 7 (also Network Seven), a British youth programme on Channel 4
Seven (UK TV channel) (also Channel 7), independent local UK TV station
See also
Channel 7 (disambiguation)
Network (disambiguation)
7 (disambiguation)
Seven Regional (disambiguation)
.NET 7 Microsoft programming framework |
https://en.wikipedia.org/wiki/British%20Rail%20TOPS%20first%20arrangement | At the end of the 1960s, British Railways adopted the Total Operations Processing System (TOPS), a computerised system developed by the Southern Pacific Railroad in the United States. All types of locomotive and multiple unit received a TOPS classification, but the first attempt at applying TOPS was soon modified. This page explains the first attempt at using TOPS and cross-refers the classes allocated with those adopted in the successful re-arrangement. An explanation of the final arrangements for TOPS classification may be found here.
Locomotives
The first attempt to apply TOPS differed from the latter approach in two significant ways:
xx/0 was not a valid subclass number. When the second arrangement was applied, original subclasses xx/1 became xx/0, xx/2 became xx/1 and so on.
Some detail differences within classes were considered sufficient for a different class number to be allocated, rather than indicate it with a subclass. In addition, there are a number of cases where conversions led to complete reclassification, where similar circumstances later would be indicated simply by allocating a new subclass. The change in approach led to some odd gaps in the list of locomotive classes when they were re-arranged, as the principal class numbers were retained unaltered. Classes affected by this change in approach include:
Class 29 (re-engined Class 21)
Class 31 (re-engined Class 30)
Class 34 (became Class 33/1)
Class 43 (North British Locomotive-built Class 42 with different make of engine and torque-converter)
Class 48 (Class 47 with experimental Sulzer vee-formation engine; later rebuilt to standard class 47 with in-line twin-bank engine)
Class 72 (became Class 73/0)
Diesel Multiple Units
The first attempt to apply TOPS to diesel multiple units saw each carriage within a unit being allocated its own unique class number. This was probably because most DMUs were not kept in permanent formations. Classes were allocated according to the following division:
100-131: Driving Motor cars
140-150: Driving Trailer cars
160-190: Trailer cars
201-203: DEMU Driving Motor cars
211-212: DEMU Driving Trailer cars
221-225: DEMU Trailer cars
251: Express DEMU Driving Motor cars
261: Express DEMU Trailer cars
However, this arrangement was later revised so that each unit adopted the class number previously given just to the main type of Driving Motor car (the exception being the DEMU units, which were completely changed). The table below cross-references the old and new TOPS classes:
Electric Multiple Units
The first attempt to apply TOPS to the Southern Region's fleet of electric multiple units, saw classes being allocated according to the following division:
40x: Southern Railway designed units
41x: 1951-type British Railways designed units
42x: 1957-type British Railways designed units
43x: 1963-type British Railways designed units
44x: 1967-type British Railways designed units
45x: Underground ('Tube'-sized) units
46x: 1971-typ |
https://en.wikipedia.org/wiki/PHP-GTK | PHP-GTK is a set of language bindings for the programming language PHP which allow GTK graphical user interface (GUI) applications to be written in PHP. PHP-GTK provides an object-oriented programming interface to GTK classes and functions. PHP-GTK partly supports GTK2, but GTK3 is unsupported.
History
PHP-GTK was originally conceived by Andrei Zmievski, who is also actively involved in the development of PHP and the Zend Engine. The idea was received well by the PHP community, and more people started to get involved with the project. James Moore and Steph Fox were among the first to join in, contributing a great deal to PHP-GTK through their documentation efforts, and Frank Kromann, also from the PHP development team, supplied Windows binaries for the project.
The first version of PHP-GTK was released in March 2001. More people began to get involved, and several extensions were contributed introducing new GUI widgets, such as Scintilla and GtkHTML. PHP-GTK 1.0 was released in October 2003 alongside several extensions, including a wrapper for libglade, which allowed the cross-platform Glade Interface Designer UI builder to be used in creating PHP-GTK applications.
Present
Zmievski and Fox are still working on the project, with Fox now maintaining PHP-GTK for Windows.
The planned next major release, PHP-GTK 2 fully uses PHP 5's powerful object model support, and brings the improved portability of GTK 2.6, and its new set of widgets. The project also has support for GtkSourceView, which provides a source code editor widget. Around half the classes have been fully documented. Scott Mattocks, an active member of the PHP-GTK documentation group, has also written a book on the subject of PHP-GTK programming.
The project is compatible with only GTK 2, not version 3.
WxPHP (WxWidgets for PHP) exists as an alternative to develop GTK PHP applications.
Example
<?php
function pressed()
{
echo "Hello again - The button was pressed!\n";
}
$window = new GtkWindow();
$button = new GtkButton('Click');
$button1 = new GtkButton('Click');
$window->set_title('Hello World!');
$window->connect_simple('destroy', array('Gtk', 'main_quit'));
$button->connect_simple('clicked', 'pressed');
$button1->connect_simple('clicked', 'pressed');
$window->add($button);
$window->show_all();
Gtk::main();
The sample PHP-GTK 2 program instantiates a GtkWindow widget with the title "Hello World!", containing a GtkButton labelled "Click Me." When the button is pressed, the message "Hello again - The button was pressed!" is displayed on the console via the callback pressed.
Deployment
Several tools have sprung up that assist the simple deployment of PHP-GTK applications. PHP compilers such as PriadoBlender and Roadsend PHP (Currently only compatible with PHP-GTK 1, while latest snapshot includes PHP-GTK 2) enable compiling applications written in PHP-GTK to a standalone binary executable. Alan Knowles' PHP Extension and Application Repository (PEAR) package, bcompiler, |
https://en.wikipedia.org/wiki/Norton%20Utilities | Norton Utilities is a utility software suite designed to help analyze, configure, optimize and maintain a computer. The latest version of the original series of Norton Utilities is Norton Utilities 16 for Windows XP/Vista/7/8 was released 26 October 2012.
Peter Norton published the first version for DOS, The Norton Utilities, Release 1, in 1982. Release 2 came out about a year later, subsequent to the first hard drives for the IBM PC line. Peter Norton's company was sold to Symantec (now known as Gen Digital) in 1990 and Peter Norton himself no longer has any connection to the brand or company.
Norton Utilities for DOS and Windows 3.1
Version 1.0
The initial 1982 release supports DOS 1.x and features the UNERASE utility. This allows files to be undeleted by restoring the first letter of the directory entry (a workaround of the FAT file system used in DOS). The UNERASE utility was what launched NU on its path to success. Quoting Peter Norton, "Why did The Norton Utilities become such popular software? Well, industry wisdom has it that software becomes standard either by providing superior capabilities or by solving problems that were previously unsolvable. In 1982, when I sat down at my PC to write Unerase, I was solving a common problem to which there was no readily available solution."
14 programs are included, on three floppy disks, list price $80:
UnErase, recovers erased files
FileFix, repairs damaged files
DiskLook, complete floppy disk displays and maps
SecMod, easy changes to floppy disk sectors
FileHide, interactive hidden file control
BatHide, automatic hidden file control
TimeMark, displays date, time, elapsed time
ScrAtr, sets DOS to work in any colors
Reverse, work in black on white
Clear, clears the screen for clarity
FileSort, keeps floppy disk files by date or name
DiskOpt, speeds floppy disk access
Beep, causes the PC speaker to beep
Print, prints files
Version 2.0
The main feature of this DOS 2.x compatible version is FILEFIND, used for searching for files. This 1983 release adds hard disk support, and the PRINT program was renamed LPRINT to avoid conflict with the DOS command introduced in MS-DOS 2.0 as PRINT.COM. Following this release Norton became Utilities Editor of PC Magazine.
The executable files were compressed with Realia's Spacemaker.
Version 3.0
This version, copyrighted 1984 but dated 21 January 1985, includes Beep, Directory Sort, Disk Test, File Attributes, File Find, File Size, Line Print, List Directories, Screen Attributes, System Information, Text Search, Time Mark, Volume Label, Wipe Disk and Wipe File.
Version 3.1
This 1986 version adds the Quick UnErase (QU) and Unremove Directory (UD) programs.
Version 4.0
Release 4.0 (1987, list $99.95) adds four new programs:
Ask, used for batch file programming
File Info, add descriptions up to 65 characters long to each file
Norton Change Directory, displays a graphic directory tree; change, remove, rename or make directories
Norton Integra |
https://en.wikipedia.org/wiki/Button%20%28disambiguation%29 | A button is a small fastener which secures two pieces of fabric together.
Button or Buttons may also refer to:
Controls
Button (computing), a virtual control displayed on a computer screen that can control software
Push-button, a switch meant to control a machine or a process
Web button, or button graphic, a digital image used to represent a link to a specific web location
Arts and entertainment
The Button (comics), a comic book cross-over event
The Button (TV series)
Button (film), a 1982 Soviet animated film
Buttons (film), a 1927 American film
"Buttons" (The Pussycat Dolls song), from PCD
"Buttons" (Sia song), from Some People Have Real Problems
Buttons (pantomime), a character in the Cinderella pantomime
Buttons, of Buttons and Mindy, a cartoon dog from the children's TV show Animaniacs
Sports and games
Button (curling), the center of the playing surface in the sport of curling
Button (poker), a marker indicating which player is currently the dealer
The Button (Reddit), a meta-game and social experiment
Places
Button Bay, Lake Champlain, Vermont, United States
Button Island (Massachusetts), United States
Button Islands, Nunavut, Canada
Button Township, Ford County, Illinois, United States
The Buttons, Argentine islands
Plants and animals
Buttons (plant), several genera of plants in the family Asteraceae
Button mushroom, sometimes shortened to just "button"
The initial segment formed in the development of a rattlesnake's rattle
People and fictional characters
Button (surname), an English surname, including a list of people and fictional characters
Button Gwinnett (1735–1777), a signer of the United States Declaration of Independence
Red Buttons (1919–2006), stage name of American comedian and actor Aaron Chwatt
Buttons Briggs (1875–1911), American Major League Baseball pitcher nicknamed "Buttons"
Other uses
Button baronets, an extinct title (1622–1712) in the Baronetage of England
The Button (sculpture), on the campus of the University of Pennsylvania
Button railway station, Button, Manitoba, Canada
Button's Coffee House London, England
Cadbury Buttons, packets of button-shaped pieces of chocolate sold in the UK
See also
Button, Button (disambiguation)
Buton, Indonesia |
https://en.wikipedia.org/wiki/Squeezebox%20%28disambiguation%29 | Squeezebox is a class of musical instruments including accordions and concertinas.
Squeezebox or Squeeze box may also refer to:
"Squeeze Box" (song), a 1975 song by the Who
Squeezebox (network music player), a digital audio streaming device
Hug machine or squeeze box, a therapeutic stress-relieving device
Squeeze box (magic trick), an illusion where the magician or his assistant has his head right next to his feet after entering a box that squeezes
A segment of the musical piece "Acadian Songs and Dances", composed by Virgil Thomson (1896–1989); from the film "Louisiana Story" (1948)
Squeeze Box: The Complete Works of "Weird Al" Yankovic, a 2017 box set by American parodist "Weird Al" Yankovic |
https://en.wikipedia.org/wiki/Rodven%20Records | Rodven Records was a Venezuelan record label that belonged to the Cisneros family owned ODC Group, then proprietors of one of the largest TV networks in the country, Venevision. They also owned a nationwide AM radio network (RadioVision, which later expanded into the FM realm as FM Center) and a record stores chain (DiscoCenter), thus serving as a channel for those artists who belonged to the roster of either of those companies (mostly signed to Venevision).
Early years
In its beginnings, SonoRodven (As it was originally named) emerged as a local source for international compilation albums (mostly those produced in the U.S. by companies such as K-Tel). Then it started handling a small roster of local luminaries, some of them also performing as actors for its sister TV network, such as Guillermo Dávila, Karina, Ricardo Montaner, Jose Luis Rodriguez "El Puma", Marcelo, and others. Then the roster began to grow up, and it became the second biggest local record label in Venezuela, alongside Sonográfica, its biggest competitor, from the rival group "Empresas 1BC" (proprietors of rival TV network RCTV, rival radio network RCR, rival record stores chain "Recordland"). Later, in the early-middle eighties, it became the Rodven Group, also comprising Video-Rodven, a commercial home video company, as well as other small record labels that previously existed in the country, such as Velvet (thus becoming VelvetRodven and later TH-Rodven, an outlet for all Latin dance music oriented artists, and later for other youth and pop acts, such as the late 80s boyband "Los Chamos", from which emerged the Venezuelan singer Carlos Baute), Love Records, and forming alliances with other record labels from around the world for local distribution purposes (thus forming EMI-Rodven, Hispavox-Rodven, Ariola-Rodven, Wea-Rodven et al.). This made Rodven's roster even bigger, allowing for the distribution of both local and foreign acts through a complete radio/TV/distribution platform, which later gave birth also to an artist management and show services company: "Big Show Productions".
Later years
By 1994, the label was responsible for releasing about 10% of the Latin music market in the United States, and had its American headquarters in Miami. It was ultimately acquired by PolyGram in 1995 (which itself was later acquired by Universal Music Group in 1999). The record label was well known for popular Latin pop and salsa singers during the 1980s and 1990s. El Club de Los Tigritos alumni and teen idol Douglas Vale released his debut album Aun Soy Chamo only in Venezuela under Rodven and the breakthrough album Hieroglyphics associated with Maverick Records and Warner Music Group.
The Rodven catalog is currently owned by Universal Music Group through Universal Music Latin Entertainment with Machete Music managing the Tropical catalog and Universal Music Latino managing the non-Tropical catalogs.
List of artists on Rodven Records and/or its associated labels
Salsa Kids
Banda |
https://en.wikipedia.org/wiki/Directory%20Opus | Directory Opus (or "DOpus" as its users tend to call it) is a file manager program, originally written for the Amiga computer system in the early to mid-1990s. Commercial development on the version for the Amiga ceased in 1997. Directory Opus is still being actively developed and sold for the Microsoft Windows operating system by GPSoftware and there are open source releases of Directory Opus 4 and 5 for Amiga.
Directory Opus was originally developed by, and is still written by, Australian Jonathan Potter. Until 1994, it was published by well-known Amiga software company Inovatronics, when Potter joined with Greg Perry and the Australian-based GPSoftware to continue its development, and has since been published by GPSoftware.
Features
Directory Opus has evolved since its first release in 1990 as a basic two-panel file manager. The interface has evolved significantly due to feedback given by its users. Some of the features include:
Single or dual-panel exploring.
Folder tree (either shared or separate for dual-display).
Tabbed explorer panels.
Ability to maintain date created/modified timestamps for both files and folders.
Internal handling of ZIP, RAR, 7Zip and other archive formats (browse them like folders).
Internal FTP handling, including (for a small extra fee) advanced FTP and SSH (browse these like folders also).
Internal MTP handling for portable devices like phones and cameras.
Flat-file display, where you can flatten a folder tree and even hide the folders themselves.
Powerful file selection and renaming tools, with advanced regex.
User-definable toolbars, menus, filetypes and filetype groups.
Preview panel, with preview of thumbnails (including animated avi thumbnails).
File collections. These are like virtual folders that contain links to the original files (unlike shortcuts, these actually deal with the files directly).
History
Release history
Amiga release history
Opus 1: January 1990
Opus 2: February 1991
Opus 3: 1991-12-01
Opus 4: 1992-12-04
Opus 5: 1995-04-12
Opus 5.5: 1996-08-01
Opus Magellan (5.6): 1997-05-17
Opus Magellan II (5.8): 1998-11-01
Opus Magellan II GPL (5.90): 2014-05-11
Versions 1 and 2 were only available direct from the author. Versions 3 and 4 were published by Inovatronics. Versions since 5 have been published by GPSoftware (German versions were published by Stefan Ossowskis Schatztruhe). The full version of Magellan II is included for free with AmiKit package.
Windows major release history
Opus 6: 2001-06-18
Opus 8: 2004-10-04
Opus 9: 2007-04-27
Opus 10: 2011-04-30
Opus 11: 2014-03-03
Opus 12: 2016-09-05
All Windows versions published by GPSoftware. (German versions published by Haage & Partner Computer GmbH.)
Open source release history
GPSoftware released the older Amiga Directory Opus 4 source code in 2000 as open-source under the GNU General Public License. AmigaOS4, AROS and MorphOS ports of this version were made available. Magellan II was released as open source under the AROS Public License |
https://en.wikipedia.org/wiki/Booter | Booter may refer to:
Self-booting disk, software loaded directly at the bootup of a computer, without the help of an operating system
a commercial denial-of-service attack service, commonly known as a booter or stresser
Marc Hill (born 1952), a Major League Baseball player nicknamed The Booter
See also
Boot (disambiguation) |
https://en.wikipedia.org/wiki/Isis%20%28disambiguation%29 | Isis most commonly refers to the Egyptian goddess Isis, or as an acronym for the Islamic State of Iraq and Syria.
Isis or ISIS may also refer to:
Computing
ISIS (operating system), used on the Intel 8085 processor
CDS ISIS, a non-numerical information storage and retrieval software developed by UNESCO
Image and Scanner Interface Specification
Infinitely Scalable Information Storage, a video storage system from Avid Technology
Integrated Software for Imagers and Spectrometers, software to process data collected by NASA planetary missions
IS-IS or ISIS, a network routing protocol
ISIS/Draw, a chemistry modelling program
Softcard or Isis Mobile Wallet, a mobile payment system
Unity ISIS, a storage device
Integrated Scientific Information System, software programs including the MDL Chime plug-in
ISIS, a variant of the JOSS programming language
Fictional characters
Isis (Bluewater Comics)
Isis (DC Comics)
Isis (Marvel Comics)
Isis (Stargate)
Music
Isis (band), an American post-metal band
Isis (horn-rock band), a 1970s all-female band
Lin Que or Isis, a member of Deadly Venoms
Isis (Lully), a 1677 opera
"Isis" (song), a song by Bob Dylan
"Isis", a song by Delta-S from Voyage to Isis
"Isis", a song by the Yeah Yeah Yeahs from Is Is
"ISIS" (song), a song by Joyner Lucas featuring Logic
Organizations
Independent Schools Information Service, part of the Independent Schools Council
Isis Innovation or Oxford University Innovation, a British technology transfer company
ISIS Equity Partners or Livingbridge, a private equity firm headquartered in London
HM Prison Isis, a young offenders institution in London
Institute for Science and International Security, an American non-governmental institution
Institute for the Scientific Investigation of Sexuality or the Family Research Institute, an American anti-gay organization
Institute for the Secularisation of Islamic Society, an American organization
International Society for Iranian Studies or the Association for Iranian Studies, a U.S.-based academic organization
International Society for the Interdisciplinary Study of Symmetry
International Species Information System or Species360, a zoo and aquarium software development and data-sharing organization
ISIS Group or the Adara Group, an international development organisation dealing with issues of human trafficking
Isis-Urania Temple, a religious group
Innovative Solutions In Space, a Dutch aerospace company
Periodicals
Isis (journal), a journal on the history of science, medicine and technology
Isis magazine, a student magazine at Oxford University
Isis, a periodical by Lorenz Oken
Places
Isis (lunar crater)
42 Isis, an asteroid
Electoral district of Isis, in Queensland, Australia
Shire of Isis, a former local government area Queensland, Australia
Port of Isis, Bulhar
Isis Highway, an Australian highway
The Isis, the upper part of the River Thames in Oxford, UK
Isis Bridge, across the River Thames near Oxford, |
https://en.wikipedia.org/wiki/Bruce%20Tognazzini | Bruce "Tog" Tognazzini (born 1945) is an American usability consultant and designer. He is a partner in the Nielsen Norman Group, which specializes in human-computer interaction. He was with Apple Computer for fourteen years, then with Sun Microsystems for four years, then WebMD for another four years.
He has written two books, Tog on Interface and Tog on Software Design, published by Addison-Wesley, and he publishes the webzine Asktog, with the tagline "Interaction Design Solutions for the Real World".
Background
Tog (as he is widely known in computer circles) built his first electro-mechanical computer in 1957, landing a job in 1959 working with the world's first check-reading computer, NCR's ERMA (Electronic Recording Method of Accounting), at Bank of America, in San Francisco.
Tog was an early and influential employee of Apple Computer, there from 1978 to 1992. In June 1978, Steve Jobs, having seen one of his early programs, The Great American Probability Machine, had Jef Raskin hire him as Apple's first applications software engineer. He's listed on the back of his book Tog on Interface (Addison Wesley, 1991) as "Apple Employee #66" (the same employee number he held later at WebMD).
In his early days at Apple, simultaneous with his developing Apple's first human interface, for the Apple II computer, he published Super Hi-Res Chess, a novelty program for the Apple II that, despite its name, did not play chess or have any hi-res (high-resolution) graphics; instead, it seemed to crash to the Applesoft BASIC prompt with an error message, but was actually a parody of Apple's BASIC command line interface that seemingly took over control of one's computer, refusing to give it back until the magic word was discovered.
His extensive work in user-interface testing and design, including publishing the first edition, in September, 1978, and seven subsequent editions of The Apple Human Interface Guidelines, played an important role in the direction of Apple's product line from the early days of Apple into the 1990s. (Steve Smith and Chris Espinosa also played a key role, incorporating the initial material on the Lisa and Macintosh computers in the fourth and fifth editions in the early 1980s.)
He and his partner, John David Eisenberg, wrote Apple Presents...Apple, the disk that taught new Apple II owners how to use the computer. This disk became a self-fulfilling prophecy: At the time of its authoring, there was no standard Apple II interface. Because new owners were all being taught Tog and David's interface, developers soon began writing to it, aided by Tog's Apple Human Interface Guidelines, and reinforced by AppleWorks, a suite of productivity applications for the Apple II into which Tog had also incorporated the same interface.
Others often report him as one of the fathers of the Macintosh interface, a claim he has always been careful to refute. Although he did consult with Jef Raskin in the early days of the Macintosh, during the later |
https://en.wikipedia.org/wiki/Anomaly-based%20intrusion%20detection%20system | An anomaly-based intrusion detection system, is an intrusion detection system for detecting both network and computer intrusions and misuse by monitoring system activity and classifying it as either normal or anomalous. The classification is based on heuristics or rules, rather than patterns or signatures, and attempts to detect any type of misuse that falls out of normal system operation. This is as opposed to signature-based systems, which can only detect attacks for which a signature has previously been created.
In order to positively identify attack traffic, the system must be taught to recognize normal system activity. The two phases of a majority of anomaly detection systems consist of the training phase (where a profile of normal behaviors is built) and testing phase (where current traffic is compared with the profile created in the training phase). Anomalies are detected in several ways, most often with artificial intelligence type techniques. Systems using artificial neural networks have been used to great effect. Another method is to define what normal usage of the system comprises using a strict mathematical model, and flag any deviation from this as an attack. This is known as strict anomaly detection. Other techniques used to detect anomalies include data mining methods, grammar based methods, and Artificial Immune System.
Network-based anomalous intrusion detection systems often provide a second line of defense to detect anomalous traffic at the physical and network layers after it has passed through a firewall or other security appliance on the border of a network. Host-based anomalous intrusion detection systems are one of the last layers of defense and reside on computer end points. They allow for fine-tuned, granular protection of end points at the application level.
Anomaly-based Intrusion Detection at both the network and host levels have a few shortcomings; namely a high false-positive rate and the ability to be fooled by a correctly delivered attack. Attempts have been made to address these issues through techniques used by PAYL and MCPAD.
See also
CrowdSec – is a collaborative, free software (MIT) anomaly-based intrusion detection system.
fail2ban
Cfengine – 'cfenvd' can be utilized to do 'anomaly detection'
Change detection
DNS analytics
Hogzilla IDS – is a free software (GPL) anomaly-based intrusion detection system.
RRDtool – can be configured to flag anomalies
Sqrrl – threat hunting based on NetFlow and other collected data
References
Computer network security |
https://en.wikipedia.org/wiki/Siemens%20Nexas | The Siemens Nexas is a class of electric multiple units manufactured by Siemens Transportation Systems for the suburban railway network of Melbourne, Australia between 2002 and 2005. The design of the trains was based on the Siemens Modular Metro.
History
In March 2000 M>Train ordered 62 Siemens Nexas trains to fulfill a franchise commitment to replace its fleet of Hitachi trains.
The original order was for 62 3-car sets, with an option for an additional ten 3-car sets. In December 2002 just before the first was delivered, National Express handed the M>Train franchise back to the Government of Victoria, thus the first Siemens Nexas trains were delivered to the government. All passed to Connex Melbourne in April 2004. The option for ten additional trains was exercised in August 2005, with the last of these delivered in January 2006.
Siemens Rail Services was contracted to provide maintenance of the trains for a period of 15 years (subject to refranchising) at Newport Workshops. With the refranchising of the network to Metro Trains Melbourne in 2009, this maintenance arrangement was retained for an initial three-year period.
The first entered service on 21 March 2003 with the last delivered in January 2006.
Braking issues
In late 2006 the trains suffered a number of braking discrepancies while in service; 14 trains overshot platforms in the space of three days. The 15 units involved in these overshoots were withdrawn from service for checks, and instructions were issued to the drivers to minimise further occurrences. By mid-January 2007, a total of 24 three-carriage trains had been impounded for testing after 20 further incidents of over-running stations since 22 December 2006.
On 13 January 2007, Connex stopped running the Siemens Nexas trains as 3-car sets until the braking issue was resolved, with the result that all services (including evenings and weekends) were operated by 6-car trains. On 29 January 2007, Connex cancelled 37 peak-period services until further notice, due to the shortage of operational trains.
By 1 February 2007, 38 three-car sets were withdrawn due to continuing braking failures, meaning that more than half of the Siemens Nexas fleet (or around 10% of the total fleet) was out of revenue service. Amidst the media reporting an escalating problem with the risk of the entire fleet potentially having to be suspended, Siemens issued a statement on 31 January 2008 saying that they believed there had been no evidence during investigations of the braking failures that would require the entire fleet of trains to be withdrawn from service. Testing of affected trains was carried out on the Werribee line between Newport and Laverton, with soapy water sprayed onto the rails to increase the amount of wheel slip experienced, in an effort to replicate the brake fault. The entire fleet has now re-entered service, although with a restriction not to run single unit (3 car) operations.
In December 2008 train operator Connex commenced |
https://en.wikipedia.org/wiki/Penetration%20test | A penetration test, colloquially known as a pentest or ethical hacking, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system; this is not to be confused with a vulnerability assessment. The test is performed to identify weaknesses (or vulnerabilities), including the potential for unauthorized parties to gain access to the system's features and data, as well as strengths, enabling a full risk assessment to be completed.
The process typically identifies the target systems and a particular goal, then reviews available information and undertakes various means to attain that goal. A penetration test target may be a white box (about which background and system information are provided in advance to the tester) or a black box (about which only basic information other than the company name is provided). A gray box penetration test is a combination of the two (where limited knowledge of the target is shared with the auditor). A penetration test can help identify a system's vulnerabilities to attack and estimate how vulnerable it is.
Security issues that the penetration test uncovers should be reported to the system owner. Penetration test reports may also assess potential impacts to the organization and suggest countermeasures to reduce the risk.
The UK National Cyber Security Center describes penetration testing as: "A method for gaining assurance in the security of an IT system by attempting to breach some or all of that system's security, using the same tools and techniques as an adversary might."
The goals of a penetration test vary depending on the type of approved activity for any given engagement, with the primary goal focused on finding vulnerabilities that could be exploited by a nefarious actor, and informing the client of those vulnerabilities along with recommended mitigation strategies.
Penetration tests are a component of a full security audit. For example, the Payment Card Industry Data Security Standard requires penetration testing on a regular schedule, and after system changes. Penetration testing also can support risk assessments as outlined in the NIST Risk Management Framework SP 800-53.
Several standard frameworks and methodologies exist for conducting penetration tests. These include the Open Source Security Testing Methodology Manual (OSSTMM), the Penetration Testing Execution Standard (PTES), the NIST Special Publication 800-115, the Information System Security Assessment Framework (ISSAF) and the OWASP Testing Guide. CREST, a not for profit professional body for the technical cyber security industry, provides its CREST Defensible Penetration Test standard that provides the industry with guidance for commercially reasonable assurance activity when carrying out penetration tests.
Flaw hypothesis methodology is a systems analysis and penetration prediction technique where a list of hypothesized flaws in a software system are compiled through analysis of the specificat |
https://en.wikipedia.org/wiki/ToneLoc | ToneLoc was a popular war dialing computer program for MS-DOS written in the early to mid-1990s by two programmers known by the pseudonyms Minor Threat (Chris Lamprecht) and Mucho Maas. The name ToneLoc was short for "Tone Locator" and was a word play on the name of the rap artist known as Tone Lōc.
ToneLoc took advantage of the extended return codes available on US Robotics modems (e.g., ATX6) to detect dial tones upon dialing a number and to detect when a human answered the phone in addition to scanning for other modems. Detection of voice numbers sped up the scanning process by disconnecting upon detecting a human instead of timing out waiting for a modem carrier signal. The detection of a dial tone after dialing a number allowed for users to search for poorly secured extenders which could be used to divert calls through.
On April 17, 2005, the source code for ToneLoc was released.
See also
WarVOX
References
External links
ToneLoc v1.10 source code
ToneLoc v0.98 User Manual
Interview with Minor Threat, ToneLoc's author, part of BBS: The Documentary
DOS software
Phreaking
Telephony |
https://en.wikipedia.org/wiki/Sleeping%20with%20the%20Enemy%20%28The%20Simpsons%29 | "Sleeping with the Enemy" is the third episode of the sixteenth season of the American animated television series The Simpsons. It originally aired on the Fox network in the United States on November 21, 2004. In the episode, Marge finds Nelson and acts as a mother figure towards him due to her belief that her children lost interest in her. Meanwhile, Lisa gets teased about her big butt, and becomes obsessed with her weight.
To date, this is Jon Vitti's last episode as writer and Lauren MacMullan's last episode as director.
Plot
Lisa gets teased by Sherri and Terri about her big butt, making her embarrassed and self-conscious about her weight. Homer only makes matters worse when he tells her about the "Simpson butt", something that all Simpsons have. Bart brings home a geography test with a grade of 100, eagerly expecting a party that was promised to him if he had got a 100. Despite Homer discovering that the watermark of Bart's test is real and that all the answers are correct, he and Marge speak to Bart's teacher. Mrs. Krabappel confesses that she did not bother to fold up the map during the test, so Bart and everyone else received 100. Marge throws Bart a party, which is attended by Patty and Selma, Grampa, Grandma, Ralph, and even Martin. Milhouse can only attend via speakerphone because he is sick with measles. Bart hates the party and to make matters worse, Lisa runs up to her room crying when Marge offers her one slice of cake.
Marge thinks her children no longer appreciate her, so when she finds Nelson catching tadpoles from a water fountain at the zoo, she decides to become a mother figure by spending quality time with him. They bond as Nelson tells Marge about his poor life involving his father abandoning him and never coming back. Marge brings him home so he can do some chores. Nelson's mother finds this out and does not want Marge giving them any charity. Later that night, Mrs. Muntz leaves town, and Nelson, having nowhere else to go, stays with the Simpsons. Marge lets him sleep in Bart's room, forcing Bart to sleep underneath his bed.
Late one night, Bart sees Nelson sing about his missing father, and sees Lisa eat an entire Labor Day cake as she was unable to take any more starvation. As Bart walks away, Nelson also sees her doing this and after talking about the situation, he offers to help Lisa get back at Sherri and Terri for teasing her. The next day, Nelson unleashes a skunk, which sprays both of them, while Lisa and her friends point and sing a parody of Jingle Bells. Both twins are scared and flee. When Lisa and Nelson return home, they find Nelson's father, who Bart found working at a freak show in a circus. It turns out that Mr. Muntz had really gone to the Kwik-E-Mart, where he had gotten a severe allergic reaction from eating a peanut bar. Coincidentally, the circus had made a stop in the Kwik-E-Mart parking lot, and the unscrupulous ringmaster noted the allergy and kept him as a forced freak for his traveling show. |
https://en.wikipedia.org/wiki/Midparent | The midparent value is defined as the average of the trait value of father and a scaled version of the mother. This value can be used in the study to analyze the data set without heeding sex effects. Studying quantitative traits in heritability studies may be complicated by sex differences observed for the trait.
Well-known examples include studies of stature height, whose midparent value hmp is given by:
where hf and hm are, respectively, the father's and mother's heights.
The coefficient 1.08 serves as a scaling factor. After the 1.08 scaling, the mean of the mother's height is the same as that of the father's, and the variance is closer to the father's; in this way, sex difference can be ignored.
References
Genetics |
https://en.wikipedia.org/wiki/Three-tier%20system | Three-tier system may refer to:
Multitier architecture, a client–server architecture in software engineering, typically of three tiers
Three-tier system (alcohol distribution), the system established in the U.S. after the repeal of Prohibition
Three-tier education, structures of schooling in England
First COVID-19 tier regulations in England, 14 October – 5 November 2020
Second COVID-19 tier regulations in England, 2 December 2020 – 29 March 2021, on 20 December it became four-tier
See also
Tier 1 (disambiguation)
Tier 2 (disambiguation)
Tier 3 (disambiguation)
Tier 4 (disambiguation) |
https://en.wikipedia.org/wiki/Roger%20Hui | Roger Kwok Wah Hui (December 29, 1953 – October 16, 2021) was a computer scientist who worked on array programming languages. He codeveloped the programming language J.
Education and career
Hui was born in Hong Kong in 1953. In 1966, he immigrated to Canada with his entire family.
In 1973, Hui entered the University of Alberta. In his second year he took a course on probability and statistics in which students were expected to learn the programming language APL with little or no formal instruction. He used all the time he could muster on a heavily burdened computer, and benefited from the APL\360 User's Manual (the book APL Language was not published until March 1975). Because the manual was written by Adin Falkoff and Kenneth E. Iverson, Hui thought it reasonable to say he learned APL from Falkoff and Iverson.
As a summer student in 1975 and 1976, Hui worked at I. P. Sharp Associates (IPSA) in Calgary, on workspaces for statistical and probability calculations. The major attraction of the job was the unrestricted computer time with access to APL.
After receiving a BSc degree with first class honors in computer science in 1977, Hui worked for two years as a full-time programmer and analyst in the new Edmonton office of IPSA, where his main duty was to support clients in their use of APL time-sharing. He attended the APL79 conference in Rochester, New York, where Iverson gave two papers: "The Role of Operators in APL" and "The Derivative Operator". On the way, Hui stopped at IPSA in Toronto and obtained a copy of "Operators and Functions" [IBM Research Report No. 7091, 1978]. He has been studying that paper and its successors ever since.
In September 1979, Hui entered the Department of Computer Science at the University of Toronto, and received his MSc in May 1981 with a thesis on "The complexity of some decompositions in matrix algebra."
After completing his master's degree, Hui worked from 1981 to 1985 as an APL systems analyst and programmer for the Alberta Energy Company in Edmonton. In February 1982 Hui purchased A Source Book in APL (1981), in which the most memorable papers were "The Design of APL" (1973), "The Evolution of APL" (1978), and "Notation as a Tool of Thought" (1980).
Hui's work was described at the APL85 conference in a paper, "DESIGN: A Financial Modelling System", written jointly with his supervisor, Fred Appleyard. The basic objects in the system were in "Direct Definition" (Iverson, 1976, 1980), and Falkoff and Iverson's The Design of APL was cited. Hui left Alberta Energy shortly after being promoted to a non-APL and non-programming position, and was out of work, and had no access to computers, from September 1985 to April 1986. This gave him plenty of time for intense study of Iverson's Rationalized APL (1983) and A Dictionary of the APL Language, as it was then named.
Hui and his wife Stella had two children. He died on October 16, 2021, from cancer.
J language
In the early 1990s, Ken Iverson and Hui began co |
https://en.wikipedia.org/wiki/Security%20First%20Network%20Bank | Security First Network Bank (SFNB) was the first pure Internet bank in the United States. It had no physical branch bank offices and could only be accessed online. It was founded in Pineville, Kentucky, in October 1995 by James (Chip) S. Mahan III. Several months later, the bank relocated to Atlanta, Georgia.
It was initially established as a savings bank along with a wholly owned software company (Security First Technologies). Eventually teller services were added in Atlanta. On September 30, 1998, Royal Bank of Canada (RBC) acquired the banking portion of the Security First Network Bank, while the software development company was spun off as S1 Corporation. RBC subsequently acquired Centura Bank of North Carolina, rebranded the online banking segment as RBC Centura, and made several adjustments to customer terms of service at that time.
Before Security First, some banks had experimented with a variety of schemes for providing online banking. Usually this involved some kind of token that was placed in an account that could only be used on the Internet. The tokens were not protected by the Federal Deposit Insurance Corporation.
Security First allowed direct access to accounts, bill payment and the viewing of check images, all of which are commonplace today.
References
External links
S1 - as Security First Technologies is now titled.
Profits swirl around Security First Network Bank
http://www.thefreelibrary.com/America's+First+Bank+on+the+Internet,+Security+First+Network+Bank,...-a017645199
Online banks |
https://en.wikipedia.org/wiki/St%20Kilda%20Festival | The St Kilda Festival, held every February (except 2021), is a free celebration of Australian music, summer, and St Kilda. Programming includes music, dance, children's activities, comedy, poetry, visual art, theatre, outdoor cinema, beach sports, and fora.
References
External links
St Kilda Festival
Festivals in Melbourne
Music festivals in Melbourne |
https://en.wikipedia.org/wiki/Red%20Carpet%20%28software%29 | Red Carpet is a package management system for Linux kernel-based operating system that was developed as part of the Ximian desktop. Ximian and therefore Red Carpet is now owned by Novell.
Red Carpet supports most of the popular Linux distributions and maintains their software installation through the RPM package database. The name Red Carpet has officially disappeared and the software renamed to ZENworks Linux Management, to match Novell's existing software distribution platform.
See also
PackageKit
External links
Official ZENworks Linux Management product page
Linux package management-related software
he:שטיח אדום |
https://en.wikipedia.org/wiki/1G | 1G refers to the first generation of cellular network (wireless) technology. These are mobile telecommunications standards that were introduced in the 1980s and were superseded by 2G. The main difference between these two mobile cellular generations is that the audio transmissions of 1G networks were analog, while 2G networks were entirely digital.
There were many different 1G cellular standards developed and used in different countries, but the most widely adopted globally were the Nordic Mobile Telephone (NMT) and Advanced Mobile Phone System (AMPS) systems. The inherent advantages of digital technology over that of analog meant that 2G networks went on to eventually completely replace them. Many 1G networks were switched off in developed economies by 2000, but in some places networks continued to operate into the 2010s.
Overview
The antecedent to 1G technology is the mobile radio telephone (i.e. "0G"), where portable phones would connect to a centralised operator. 1G refers to the very first generation of cellular networks. Cellular technology employ a network of cells throughout a geographical area using low-power radio transmitters.
History
The first commercial cellular network was launched in Japan by Nippon Telegraph and Telephone (NTT) in 1979, initially in the metropolitan area of Tokyo. The first phone that used this network was called TZ-801 built by Panasonic. Within five years, the NTT network had been expanded to cover the whole population of Japan and became the first nationwide 1G/cellular network. Before the network in Japan, Bell Laboratories built the first cellular network around Chicago in 1977 and trialled it in 1978.
As in the pre-cellular era, the Nordic countries were among the pioneers in wireless technologies. These countries together designed the NMT standard which first launched in Sweden in 1981. NMT was the first mobile phone network to feature international roaming. In 1983, the first 1G cellular network launched in the United States, which was Chicago-based Ameritech using the Motorola DynaTAC mobile phone.
In the early to mid 1990s, 1G was superseded by newer 2G (second generation) cellular technologies such as GSM and cdmaOne. Although 1G also used digital signaling to connect the radio towers (which listen to the handsets) to the rest of the telephone system, the voice itself during a call is encoded to digital signals in 2G whereas 1G uses analog FM modulation for the voice transmission, much like a 2-way land mobile radio. Most 1G networks had been discontinued by the early 2000s. Some regions especially Eastern Europe continued running these networks for much longer. The last operating 1G network was closed down in Russia in 2017.
Adoption
After Japan, the earliest commercial cellular networks launched in 1981 in Sweden, Norway and Saudi Arabia, followed by Denmark, Finland and Spain in 1982, the U.S. in 1983 and Hong Kong, South Korea, Austria and Canada in 1984. By 1986 networks had also launched |
https://en.wikipedia.org/wiki/Mobile%20radio%20telephone | Mobile radio telephone systems were mobile telephony systems that preceded modern cellular network technology. Since they were the predecessors of the first generation of cellular telephones, these systems are sometimes retroactively referred to as pre-cellular (or sometimes zero generation, that is, 0G) systems. Technologies used in pre-cellular systems included the Push to Talk (PTT or manual), Mobile Telephone Service (MTS), Improved Mobile Telephone Service (IMTS), and Advanced Mobile Telephone System (AMTS) systems.
These early mobile telephone systems can be distinguished from earlier closed radiotelephone systems in that they were available as a commercial service that was part of the public switched telephone network, with their own telephone numbers, rather than part of a closed network such as a police radio or taxi dispatching system.
These mobile telephones were usually mounted in cars or trucks (thus called car phones), although portable briefcase models were also made. Typically, the transceiver (transmitter-receiver) was mounted in the vehicle trunk and attached to the "head" (dial, display, and handset) mounted near the driver seat.
They were sold through WCCs (Wireline Common Carriers, a.k.a. telephone companies), RCCs (Radio Common Carriers), and two-way radio dealers.
Origins
Early examples for this technology:
Motorola, in conjunction with the Bell System, operated the first commercial mobile telephone service (MTS) in the US in 1946, as a service of the wireline telephone company.
The A-Netz launched 1952 in West Germany as the country's first public commercial mobile phone network.
System 1 launch in 1959 in the United Kingdom, the 'Post Office South Lancashire Radiophone Service', covering South Lancashire and operated from a telephone exchange in Manchester is cited as the country's first mobile phone network. However it was manual (needed to be connected via an operator) and with very little coverage for several decades.
First automatic system was the Bell System's IMTS which became available in 1964, offering automatic dialing to and from the mobile.
"Altai" mobile telephone system was launched into the experimental service in 1963 in the Soviet Union, becoming fully operational in 1965, a first automatic mobile phone system in Europe.
Televerket opened its first manual mobile telephone system in Norway in 1966. Norway was later the first country in Europe to get an automatic mobile telephone system.
The Autoradiopuhelin (ARP) launched in 1971 in Finland as the country's first public commercial mobile phone network
The Automatizovaný městský radiotelefon (AMR) launched in 1978, fully operational in 1983, in Czechoslovakia as the first analog mobile radio telephone in the whole Eastern Bloc
The B-Netz launched 1972 in West Germany as the country's second public commercial mobile phone network (albeit the first one that did not require human operators to connect calls)
Radio Common Carrier
Parallel to Improved Mob |
https://en.wikipedia.org/wiki/KeyKOS | KeyKOS is a persistent, pure capability-based operating system for the IBM S/370 mainframe computers. It allows emulating the environments of VM, MVS, and Portable Operating System Interface (POSIX). It is a predecessor of the Extremely Reliable Operating System (EROS), and its successor operating systems, CapROS, and Coyotos. KeyKOS is a nanokernel-based operating system.
In the mid-1970s, development of KeyKOS began at Tymshare, Inc., under the name GNOSIS. In 1984, McDonnell Douglas (MD) bought Tymshare. A year later MD spun off Key Logic, which bought GNOSIS and renamed it KeyKOS.
References
External links
, Norman Hardy
GNOSIS: A Prototype Operating System for the 1990s, a 1979 paper, Tymshare Inc.
KeyKOS - A Secure, High-Performance Environment for S/370, a 1988 paper, Key Logic, Inc.
Nanokernels
Capability systems
Microkernel-based operating systems |
https://en.wikipedia.org/wiki/Voigt%20profile | The Voigt profile (named after Woldemar Voigt) is a probability distribution given by a convolution of a Cauchy-Lorentz distribution and a Gaussian distribution. It is often used in analyzing data from spectroscopy or diffraction.
Definition
Without loss of generality, we can consider only centered profiles, which peak at zero. The Voigt profile is then
where x is the shift from the line center, is the centered Gaussian profile:
and is the centered Lorentzian profile:
The defining integral can be evaluated as:
where Re[w(z)] is the real part of the Faddeeva function evaluated for
In the limiting cases of and then simplifies to and , respectively.
History and applications
In spectroscopy, a Voigt profile results from the convolution of two broadening mechanisms, one of which alone would produce a Gaussian profile (usually, as a result of the Doppler broadening), and the other would produce a Lorentzian profile. Voigt profiles are common in many branches of spectroscopy and diffraction. Due to the expense of computing the Faddeeva function, the Voigt profile is sometimes approximated using a pseudo-Voigt profile.
Properties
The Voigt profile is normalized:
since it is a convolution of normalized profiles. The Lorentzian profile has no moments (other than the zeroth), and so the moment-generating function for the Cauchy distribution is not defined. It follows that the Voigt profile will not have a moment-generating function either, but the characteristic function for the Cauchy distribution is well defined, as is the characteristic function for the normal distribution. The characteristic function for the (centered) Voigt profile will then be the product of the two:
Since normal distributions and Cauchy distributions are stable distributions, they are each closed under convolution (up to change of scale), and it follows that the Voigt distributions are also closed under convolution.
Cumulative distribution function
Using the above definition for z , the cumulative distribution function (CDF) can be found as follows:
Substituting the definition of the Faddeeva function (scaled complex error function) yields for the indefinite integral:
which may be solved to yield
where is a hypergeometric function. In order for the function to approach zero as x approaches negative infinity (as the CDF must do), an integration constant of 1/2 must be added. This gives for the CDF of Voigt:
The uncentered Voigt profile
If the Gaussian profile is centered at and the Lorentzian profile is centered at , the convolution is centered at and the characteristic function is:
The probability density function is simply offset from the centered profile by :
where:
The mode and median are both located at .
Derivatives
Using the definition above for and , the first and second derivatives can be expressed in terms of the Faddeeva function as
and
respectively.
Often, one or multiple Voigt profiles and/or their respective derivatives need to be f |
https://en.wikipedia.org/wiki/Jadeworld%20%28Australian%20TV%20network%29 | TVB Jadeworld was a broadcasting station based in Sydney, Australia that caters for the Chinese community in Australia. It currently consists of 16 channels, with many programs relayed from TVB operations in Hong Kong and Taiwan.
As of 31 July 2017, the satellite broadcast service of those channels was ceased and replaced by the service by TVB Anywhere.
Current channel line-up
History
Jadeworld began as JEDi (Jade Entertainment Digital Interactive) in 2000, broadcasting only 8 channels-
CCTV-4 was added in 2000, while CNBC Asia was taken off the channels in 2001.
JET-TV was offered to certain plan subscribers from until 2005.
The addition of Dragon TV, Hunan TV, Chonqing TV and Phoenix TV in 2006-07 caters for subscribers of Mainland descent.
In May 2017, Jadeworld reduced to 26 channels.
See also
Subscription television in Australia
References
External links
Australian subscription television services
Defunct television channels in Australia
TVB channels
Television channels and stations established in 1998
Chinese-Australian culture
Overseas Chinese organisations
Television channels and stations disestablished in 2017
Ethnic mass media in Australia |
https://en.wikipedia.org/wiki/Relational%20operator | In computer science, a relational operator is a programming language construct or operator that tests or defines some kind of relation between two entities. These include numerical equality (e.g., ) and inequalities (e.g., ).
In programming languages that include a distinct boolean data type in their type system, like Pascal, Ada, or Java, these operators usually evaluate to true or false, depending on if the conditional relationship between the two operands holds or not. In languages such as C, relational operators return the integers 0 or 1, where 0 stands for false and any non-zero value stands for true.
An expression created using a relational operator forms what is termed a relational expression or a condition. Relational operators can be seen as special cases of logical predicates.
Equality
Usage
Equality is used in many programming language constructs and data types. It is used to test if an element already exists in a set, or to access to a value through a key. It is used in switch statements to dispatch the control flow to the correct branch, and during the unification process in logic programming.
One possible meaning of equality is that "if a equals b, then either a or b can be used interchangeably in any context without noticing any difference." But this statement does not necessarily hold, particularly when taking into account mutability together with content equality.
Location equality vs. content equality
Sometimes, particularly in object-oriented programming, the comparison raises questions of data types and inheritance, equality, and identity. It is often necessary to distinguish between:
two different objects of the same type, e.g., two hands
two objects being equal but distinct, e.g., two $10 banknotes
two objects being equal but having different representation, e.g., a $1 bill and a $1 coin
two different references to the same object, e.g., two nicknames for the same person
In many modern programming languages, objects and data structures are accessed through references. In such languages, there becomes a need to test for two different types of equality:
Location equality (identity): if two references (A and B) reference the same object. Interactions with the object through A are indistinguishable from the same interactions through B, and in particular changes to the object through A are reflected through B.
Content equality: if the objects referenced by two references (A and B) are equivalent in some sense:
Structural equality (that is, their contents are the same). which may be either shallow (testing only immediate subparts), or deep (testing for equality of subparts recursively). A simple way to achieve this is through representational equality: checking that the values have the same representation.
Some other tailor-made equality, preserving the external behavior. For example, 1/2 and 2/4 are considered equal when seen as a rational number. A possible requirement would be that "A = B if and only if all ope |
https://en.wikipedia.org/wiki/UIF | UIF may refer to:
In Computing:
Universal Image Format, a proprietary disk image format used by MagicISO
A little known and rarely used computer file format used by WordPerfect
UI Foundry
Other uses:
Unidad de Inteligencia Financiera (Argentina), the intelligence agency of the Argentine Ministry of Economy
Unidad de Inteligencia Financiera (Mexico), a financial investigative agency in Mexico
Unità di Informazione Finanziaria, the financial intelligence agency of Italy
Unión de Impresores de Filipinas, in the Philippines
Union Interlinguiste de France, an organization that promotes Interlingua in France
United Indoor Football, an indoor American football league
University Islamic Financial, an American financial service company which provides home and commercial financing.
United Islamic Front
United Issarak Front
Unemployment Insurance Fund, in South Africa. |
https://en.wikipedia.org/wiki/Mr.%20Plow | "Mr. Plow" is the ninth episode of the fourth season of the American animated television series The Simpsons. It originally aired on the Fox Network in the United States on November 19, 1992. In the episode, Homer buys a snowplow and starts a business plowing driveways. It is a huge success, and inspired by this, Barney Gumble starts a rival company and quickly puts Homer out of business.
The episode was written by Jon Vitti and directed by Jim Reardon. The episode was well received, with some critics calling it one of the best in the show's history.
Dan Castellaneta won his second consecutive Emmy Award for "Outstanding Voice-Over Performance" for this episode (Castellaneta performs the voice of both Homer and Barney in the series). The episode was also submitted in the "Outstanding Comedy Series" category although ultimately it was not nominated.
Plot
After crashing into Marge's car on a snowy night (which he had spent drinking at Moe's), Homer is forced to purchase a replacement car. After he is initially unsuccessful after test driving a tiny foreign vehicle which is unsuitable for him, a car show salesman convinces Homer to get a pickup truck mounted with a snowplow. Homer agrees on the basis that he can make the payments by plowing people's driveways. Homer starts his plowing business, titled Mr. Plow, but he has trouble finding customers until Lisa suggests recording an advertisement on late night local television. The resulting commercial and jingle attracts many customers and the business is a booming success. Homer is given the key to the city in recognition of his service to the community.
Barney starts a rival company called the Plow King, and creates his own commercial, with Linda Ronstadt singing the jingle, which badmouths Homer. Homer pays an agency to make him a new commercial, but it turns out to be completely baffling. As a result, Homer loses his success to Barney, and Mayor Quimby revokes his key to the city and hands it over to Barney.
To get revenge and regain his customers, Homer tricks Barney into plowing a non-existent driveway on Widow's Peak, a large, treacherous mountain outside of town. Homer begins to plow driveways again, but sees a news report showing that Barney has been trapped in an avalanche. Homer immediately drives to the mountain and rescues him. The friends resolve their differences and agree to work together in the plow business. God, angered by Homer saying that not even he can stop them, promptly retaliates by causing a heatwave, melting all the snow and effectively putting them both out of business. As Homer can no longer make the snowplow payments, his plow is repossessed, but he keeps the Mr. Plow jacket to wear to bed for Marge, turning her on.
Production
When the episode was being written, many writers' contracts had expired, so there weren't some writers at the annual story retreat. Al Jean was very nervous about how they could write a whole new season with such a small crew. In addition, t |
https://en.wikipedia.org/wiki/MySQL%20Cluster | MySQL Cluster is a technology providing shared-nothing clustering and auto-sharding for the MySQL database management system. It is designed to provide high availability and high throughput with low latency, while allowing for near linear scalability. MySQL Cluster is implemented through the NDB or NDBCLUSTER storage engine for MySQL ("NDB" stands for Network Database).
Architecture
MySQL Cluster is designed around a distributed, multi-master ACID compliant architecture with no single point of failure. MySQL Cluster uses automatic sharding (partitioning) to scale out read and write operations on commodity hardware and can be accessed via SQL and Non-SQL (NoSQL) APIs
Replication
Internally MySQL Cluster uses synchronous replication through a two-phase commit mechanism in order to guarantee that data is written to multiple nodes upon committing the data. (This is in contrast to what is usually referred to as "MySQL Replication", which is .) Two copies (known as replicas) of the data are required to guarantee availability. MySQL Cluster automatically creates “node groups” from the number of replicas and data nodes specified by the user. Updates are synchronously replicated between members of the node group to protect against data loss and support fast failover between nodes.
It is also possible to replicate asynchronously between clusters; this is sometimes referred to as "MySQL Cluster Replication" or "geographical replication". This is typically used to replicate clusters between data centers for disaster recovery or to reduce the effects of network latency by locating data physically closer to a set of users. Unlike standard MySQL replication, MySQL Cluster's geographic replication uses optimistic concurrency control and the concept of Epochs to provide a mechanism for conflict detection and resolution, enabling active/active clustering between data centers.
Starting with MySQL Cluster 7.2, support for synchronous replication between data centers was supported with the Multi-Site Clustering feature.
Horizontal data partitioning (auto-sharding)
MySQL Cluster is implemented as a fully distributed multi-master database ensuring updates made by any application or SQL node are instantly available to all of the other nodes accessing the cluster, and each data node can accept write operations.
Data within MySQL Cluster (NDB) tables is automatically partitioned across all of the data nodes in the system. This is done based on a hashing algorithm based on the primary key on the table, and is transparent to the end application. Clients can connect to any node in the cluster and have queries automatically access the correct shards needed to satisfy a query or commit a transaction. MySQL Cluster is able to support cross-shard queries and transactions.
Users can define their own partitioning schemes. This allows developers to add “distribution awareness” to applications by partitioning based on a sub-key that is common to all rows being accessed by h |
https://en.wikipedia.org/wiki/Here%20Come%20the%20Brides | Here Come the Brides is an American comedy Western television series from Screen Gems that aired on the ABC television network from September 25, 1968, to April 3, 1970. It was loosely based on Asa Mercer's efforts in the 1860s to import marriageable women (the Mercer Girls) from the East Coast cities of the United States to Seattle, where there was a shortage.
Synopsis
In the pilot episode, smooth-talking, charismatic logging company boss Jason Bolt (Robert Brown) is faced with a shutdown of his operation as lonely lumberjacks are ready to leave Seattle due to the lack of female companionship. He promises to find marriageable ladies willing to come to the frontier town (population 152) and stay for a full year. Sawmill owner Aaron Stempel (Mark Lenard) puts up much of the expense money as a wager that Bolt will not succeed in bringing 100 suitable women; the Bolt brothers bet their mountain, Bridal Veil Mountain, home to their logging company.
The Bolts travel to New Bedford, Massachusetts, recruit the women, then charter a mule-ship to take them back to Seattle. Local saloon owner Lottie (Joan Blondell) takes the women under her wing and becomes a mother figure to them, while Bolt desperately works to keep the women from leaving at the next high tide.
Eventually, the women decide to give Seattle and the loggers a chance. The ship's captain, Clancy (Henry Beckman), develops a relationship with Lottie and becomes a regular character in the series.
Much of the dramatic and comedic tension in the first season revolved around Stempel's efforts to sabotage the deal so he can take over the Bolts' holdings. Stempel became more friendly in the second and final season, which focused more on the development of individual characters and the conflicts associated with newcomers and with people just passing through. One running theme is the importance of family, as the Bolt brothers show through the closeness of their relationships, that by sticking together, democratically taking family votes, they can overcome the surprising obstacles life presents.
Bobby Sherman and David Soul were propelled to pop stardom as Jason's brothers, Jeremy and Joshua. Jeremy took a prominent role, not only as the boyfriend of Candy Pruitt (Bridget Hanley), the beautiful, unofficial leader of the brides, but also as a young man with a stammer. In one episode, he is temporarily able to manage his stammer following coaching by a traveler who has come to Seattle. Upon discovering that his benefactor is actually a con artist, his faith is shaken so deeply that the stammer returns.
Background and production
The producers said the show was inspired by the movie Seven Brides for Seven Brothers in an interview with LA Times TV critic Cecil Smith.
As a television Western, set shortly after the end of the Civil War, the series rarely featured any form of gunplay, and violence was generally limited to comical fistfights. This was in keeping with the restrictions on television v |
https://en.wikipedia.org/wiki/OS9 | OS9, OS-9, or OS 9 may refer to:
Mac OS 9, an operating system for the Apple Macintosh
iOS 9, the ninth version of the iOS operating system
OS-9, a Unix-like real time operating system
OS/9, an operating system for the UNIVAC
OS9 (gene), which encodes protein OS-9 in humans |
https://en.wikipedia.org/wiki/AMD%20K8 | The AMD K8 Hammer, also code-named SledgeHammer, is a computer processor microarchitecture designed by AMD as the successor to the AMD K7 Athlon microarchitecture. The K8 was the first implementation of the AMD64 64-bit extension to the x86 instruction set architecture.
Features
Processors
Processors based on the K8 core include:
Athlon 64 - first 64-bit consumer desktop
Athlon 64 X2 - first dual-core ('X2') desktop
Athlon X2 - later model dual-core desktop with '64' omitted
Athlon 64 FX - enthusiast desktop (multipliers unlocked)
Sempron - low-end, low-cost desktop
Opteron - server market
Turion 64 - mobile computing market
Turion 64 X2 - dual-core mobile processor
The K8 core is very similar to the K7. The most radical change is the integration of the AMD64 instructions and an on-chip memory controller. The memory controller drastically reduces memory latency and is largely responsible for most of the performance gains from K7 to K8.
Nomenclature
It is perceived by the PC community that after the use of the codename K8 for the Athlon 64 processor family, AMD no longer uses K-nomenclatures (which originally stood for Kryptonite) since no K-nomenclature naming convention beyond K8 has appeared in official AMD documents and press releases after the beginning of 2005. AMD now refers to the codename K8 processors as the Family 0Fh processors. 10h and 0Fh refer to the main result of the CPUID x86 processor instruction. In hexadecimal numbering, 0F(h) (where the h represents hexadecimal numbering) equals the decimal number 15, and 10(h) equals the decimal number 16. (The "K10h" form that sometimes pops up is an improper hybrid of the "K" code and Family identifier number.)
See also
List of AMD Athlon 64 processors - desktop
List of AMD Athlon X2 processors - desktop
List of AMD Sempron processors - low end
List of AMD Opteron processors - server
List of AMD Turion processors - mobile
AMD K9
AMD 10h
Jim Keller (engineer)
References
K08
AMD microarchitectures
X86 microarchitectures |
https://en.wikipedia.org/wiki/Barry%20Wellman | Barry Wellman (born 1942) is an American-Canadian sociologist and is the co-director of the Toronto-based international NetLab Network. His areas of research are community sociology, the Internet, human-computer interaction and social structure, as manifested in social networks in communities and organizations. His overarching interest is in the paradigm shift from group-centered relations to networked individualism. He has written or co-authored more than 300 articles, chapters, reports and books. Wellman was a professor at the Department of Sociology, University of Toronto for 46 years, from 1967 to 2013, including a five-year stint as S.D. Clark Professor.
Among the concepts Wellman has published are: "network of networks" and "the network city" (both with Paul Craven), "the community question", "computer networks as social networks", "connected lives" and the "immanent Internet" (both with Bernie Hogan), "media-multiplexity" (with Caroline Haythornthwaite), "networked individualism" and "networked society", "personal community" and "personal network" and three with Anabel Quan-Haase: "hyperconnectivity", "local virtuality" and "virtual locality".
Lee Rainie and Barry Wellman are co-authors of the 2012 prize-winning Networked: The New Social Operating System (MIT Press). Wellman is also the editor of three books, and the author of more than 500 articles, often written with students.
Wellman has received career achievement awards from the Canadian Sociology and Anthropology Association, the International Network for Social Network Analysis, the International Communication Association, the GRAND Network of Centres of Excellence, and two sections of the American Sociological Association: Community and Urban Sociology; Communication and Information Technologies. He was elected as a Fellow of the Royal Society of Canada in 2007. In 2012, Wellman was identified as having the highest h-index (of citations) of all Canadian sociologists. Wellman was a faculty member at the Department of Sociology at the University of Toronto for 46 years, from 1967 to 2013. Since July 2013, he has co-directed the NetLab Network. Wellman was honoured with the Lim Chong Yah Visiting Professorship of Communications and New Media at the National University of Singapore in January–February 2015.
Early life
Barry Wellman was born and raised in the Grand Concourse and Fordham Road area of the Bronx, New York City. He attended P.S. 33 and Creston J.H.S. 79, and was a teenage member of the Fordham Flames. He gained his high school degree from the Bronx High School of Science in 1959. He received his A.B. (Bachelor's) degree magna cum laude from Lafayette College in 1963, majoring in social history and winning prizes in both history and religious studies. At Lafayette, he was a member of the McKelvy Honors House and captained the undefeated 1962 College Bowl team, whose final victory was over Berkeley.
His graduate work was at Harvard University, where he trained with Cha |
https://en.wikipedia.org/wiki/Client-side%20prediction | Client-side prediction is a network programming technique used in video games intended to conceal negative effects of high latency connections. The technique attempts to make the player's input feel more instantaneous while governing the player's actions on a remote server.
The process of client-side prediction refers to having the client locally react to user input before the server has acknowledged the input and updated the game state. So, instead of the client only sending control input to the server and waiting for an updated game state in return, the client also, in parallel with this, predicts the game state locally, and gives the user feedback without awaiting an updated game state from the server.
Client-side prediction reduces latency problems, since there no longer will be a delay between input and client-side visual feedback due to network ping times. However, it also introduces a desynchronization of the client and server game states, which needs to be handled to keep the game playable. Usually, the desync is corrected when the client receives the updated game state, but as instantaneous correction would lead to "snapping", there are usually some "smoothing" algorithms involved. For example, one common smoothing algorithm would be to check each visible object's client-side location to see if it is within some error epsilon of its server-side location. If not, the client-side's information is updated to the server-side directly (snapped because of too much desynchronization). However, if the client-side location is not too far, a new position between the client-side and server-side is interpolated; this position is set to be within some small step delta from the client-side location, which is generally judged to be "small enough" to be unintrusive to the user.
Another solution to the desynchronization issue, commonly used in conjunction with client-side prediction, is called server reconciliation. The client includes a sequence number in every input sent to the server, and keeps a local copy. When the server sends an authoritative update to a client, it includes the sequence number of the last processed input for that client. The client accepts the new state, and reapplies the inputs not yet processed by the server, completely eliminating visible desynchronization issues in most cases.
The earliest known first-person shooter to use client-side prediction is Duke Nukem 3D, which had it built-in since the January 29, 1996 shareware release. The technique was also a prominent feature of QuakeWorld, the popular add-on to Quake. While network play was included in the original Quake game, it was optimized mainly for LAN play. Having had high-speed home connections (a rarity at the time), Quake'''s designers overlooked their assumptions of high bandwidth and low ping times that made playing online frustrating for dial-up users. After a series of experiments in a long private beta, id Software released QuakeWorld'' with a new predictive |
https://en.wikipedia.org/wiki/Robert%20S.%20Harris%20%28programmer%29 | Robert S. Harris, nicknamed RoSHa, is the designer and programmer of several 1980s home computer and console games, including War Room (ColecoVision, 1983) and Killer Bees! (Odyssey 2, 1983).
Early life
Harris was born in Boalsburg, Pennsylvania and graduated from Carnegie Mellon University with a Bachelor of Science in Mathematics in 1979.
Works
Killer Bees! (1983)
References
External links
Harris's web page
Video game designers
Video game programmers
Living people
Year of birth missing (living people)
Carnegie Mellon University alumni |
https://en.wikipedia.org/wiki/Linearizability | In concurrent programming, an operation (or set of operations) is linearizable if it consists of an ordered list of invocation and response events, that may be extended by adding response events such that:
The extended list can be re-expressed as a sequential history (is serializable).
That sequential history is a subset of the original unextended list.
Informally, this means that the unmodified list of events is linearizable if and only if its invocations were serializable, but some of the responses of the serial schedule have yet to return.
In a concurrent system, processes can access a shared object at the same time. Because multiple processes are accessing a single object, a situation may arise in which while one process is accessing the object, another process changes its contents. Making a system linearizable is one solution to this problem. In a linearizable system, although operations overlap on a shared object, each operation appears to take place instantaneously. Linearizability is a strong correctness condition, which constrains what outputs are possible when an object is accessed by multiple processes concurrently. It is a safety property which ensures that operations do not complete unexpectedly or unpredictably. If a system is linearizable it allows a programmer to reason about the system.
History of linearizability
Linearizability was first introduced as a consistency model by Herlihy and Wing in 1987. It encompassed more restrictive definitions of atomic, such as "an atomic operation is one which cannot be (or is not) interrupted by concurrent operations", which are usually vague about when an operation is considered to begin and end.
An atomic object can be understood immediately and completely from its sequential definition, as a set of operations run in parallel which always appear to occur one after the other; no inconsistencies may emerge. Specifically, linearizability guarantees that the invariants of a system are observed and preserved by all operations: if all operations individually preserve an invariant, the system as a whole will.
Definition of linearizability
A concurrent system consists of a collection of processes communicating through shared data structures or objects. Linearizability is important in these concurrent systems where objects may be accessed by multiple processes at the same time and a programmer needs to be able to reason about the expected results. An execution of a concurrent system results in a history, an ordered sequence of completed operations.
A history is a sequence of invocations and responses made of an object by a set of threads or processes. An invocation can be thought of as the start of an operation, and the response being the signaled end of that operation. Each invocation of a function will have a subsequent response. This can be used to model any use of an object. Suppose, for example, that two threads, A and B, both attempt to grab a lock, backing off if it's already taken |
https://en.wikipedia.org/wiki/Michael%20Widenius | Ulf Michael Widenius (often called Monty; born 3 March 1962, in Helsinki, Finland) is the main author of the original version of the open source MySQL database, a founding member of the MySQL AB company and CTO of the MariaDB Corporation AB. Additionally, he is a founder and general partner at venture capital firm OpenOcean.
Biography
Early years
Widenius went to the co-educational school Broban, which was first merged into Minervaskolan and later to Lönnbeckska gymnasiet. After dropping out of Helsinki University of Technology, Widenius started working for Tapio Laakso Oy in 1981. In 1985 he founded TCX DataKonsult AB (a Swedish data warehousing company) with Allan Larsson. In 1995 he began writing the first version of the MySQL database with David Axmark, released in 1996. He is the co-author of the MySQL Reference Manual, published by O'Reilly in June 2002; and in 2003 he was awarded the Finnish Software Entrepreneur of the Year prize.
Until MySQL AB's sale to Sun Microsystems in 2008, he was the chief technical officer of MySQL AB. After the acquisition, he remained one of the primary forces behind the ongoing development of MySQL.
MySQL acquired by Sun
Widenius sold MySQL to Sun in January 2008, earning about €16.6 million in capital gains in 2008 (€16.8 million total income), making him one of the top 10 highest earners in Finland that year.
After Sun
In 2008, Widenius established venture capital firm OpenOcean with his MySQL AB colleague Patrik Backman and early advisors Tom Henriksson and Ralf Wahlsten.
On 5 February 2009, he announced that he was leaving Sun in order to create his own company.
On 12 December 2009, Widenius asked MySQL customers to lobby the European Commission (EC), regarding Oracle's acquisition of Sun, citing concerns about potential Oracle control of MySQL; this resulted in an online petition campaign called "Save MySQL".
After leaving Sun, he formed Monty Program Ab and forked MySQL into MariaDB, named after his youngest daughter, Maria. It includes several patches and plugins developed by the company itself or the community. One of these plugins is the Aria storage engine, which was renamed from Maria to avoid confusion with MariaDB. Monty Program Ab merged with SkySQL, who later renamed themselves MariaDB Corporation. He is also CTO of the MariaDB Foundation, the non-profit organisation charged with promoting, protecting and advancing the MariaDB codebase, community, and ecosystem.
The Open Database Alliance, also known as ODBA, was founded in 2009 by the Monty Program and Percona. According to its first announcement, "the Open Database Alliance will comprise a collection of companies working together to provide the software, support and services for MariaDB, an enterprise-grade, community-developed branch of MySQL".
Personal life
Widenius lives in Kauniainen, Finland with his second wife Anna and his youngest daughter, Maria. Widenius has three children – My, Max, and Maria – who inspired the names for |
https://en.wikipedia.org/wiki/Atari%20Portfolio | The Atari Portfolio (Atari PC Folio) is an IBM PC-compatible palmtop PC, released by Atari Corporation in June 1989. This makes it the world's first palmtop computer.
History
DIP Research Ltd. based in Guildford, Surrey, UK released a product in the UK called the DIP Pocket PC in 1989. Soon after its release, DIP licensed this product to Atari for sale as the Portfolio in the UK and US. In Italy, Spain and Germany, it was originally marketed as PC Folio instead. DIP officially stood for "Distributed Information Processing", although secretly it actually stood for "David, Ian and Peter", the three founding members of the company who were former employees of Psion. The original founder of the company (first called "Crushproof Software") was Ian H. S. Cullimore, and the other two David Frodsham and Peter Baldwin. Cullimore was involved in designing the early Organiser products at Psion before the DIP Pocket PC project. The technologic successor of the Portfolio was the also DIP-developed Sharp PC-3000/3100. DIP Research was later acquired by Phoenix Technologies in 1994.
Technology
The Portfolio uses an Intel 80C88 CPU running at 4.9152 MHz and runs "DIP Operating System 2.11" (DIP DOS), an operating system mostly compatible to MS-DOS 2.11, but with some DOS 2.xx functionality lacking and some internal data structures more compatible with DOS 3.xx. It has 128 KB of RAM and 256 KB of ROM which contains the OS and built-in applications. The on-board RAM is divided between system memory and local storage (the C: drive). The LCD is monochrome without backlight and has pixels or 40 characters × 8 lines.
The sound is handled by a small Dual-Tone Multi-Frequency speaker capable of outputting tones between 622 and 2,489Hz, the same range as touch tone telephones, so users could not only use the address book app to store phone numbers, but actually speed dial them too by holding the device up to a telephone handset.
Power is supplied by three AA size removable alkaline batteries. The computer's memory is preserved during battery changes. There is also an optional AC adapter (120V: HPC-401, 230V: HPC-402).
There is an expansion port on the right side of the computer for parallel (HPC-101), serial (HPC-102), modem or MIDI expansion modules. It uses a Bee Card expansion port for removable memory (aka Credit Card Memory or CCM), which is not compatible with PC card as it predated that standard. Expansion cards were available in sizes of 32 KB (HPC-201), 64 KB (HPC-202), and 128 KB (HPC-203) initially, and later were available in capacities up to 4 MB. The expansion cards were backed up by a replaceable battery, which last approximately two years. Built-in applications include a text editor, spreadsheet (Lotus 1-2-3 compatible), phone book and time manager. Expansion cards contain programs such as a chess game (HPC-750), a file manager (HPC-704), and a finance manager (HPC-702). Most text-based DOS applications can run on the Portfolio as long as they did |
https://en.wikipedia.org/wiki/Tudhoe | Tudhoe is a village in County Durham, in England. It lies just outside Spennymoor, a short distance to the west of the Great North Road. Tudhoe lay at the centre of a network of roads: one ran to Durham by way of Sunderland Bridge and Croxdale, another to Kirk Merrington, a third to Bishop Auckland, a fourth to Whitworth and Byers Green, and a fifth across a ford to Brancepeth Castle and village on the far side of the river. All except the Brancepeth road are shown on Thomas Jeffrey's map of County Durham of 1758.
Tudhoe is now dwarfed by Spennymoor, an industrial town that grew up around the Tudhoe iron works in the 19th century. The modern town of Spennymoor lies only a few fields from Tudhoe, but the contours are such that it cannot be seen from most of the village, and Tudhoe today gives the impression that it is still an isolated country village.
For most of its history, Tudhoe has been in the parish of Brancepeth. The parish church of St Brandon's, dating from the 16th century, was one of the finest village churches in County Durham until its destruction by fire in 1998. Brancepeth lies across the River Wear from Tudhoe; there has never been a bridge, and the ford was not an easy one. In winter, it was often impassable, and Tudhoe baptisms, weddings and burials then took place at Whitworth. Because of this, Tudhoe was always seen (from Brancepeth) as an isolated outpost. Tudhoe's own Anglican churches, Holy Innocents and St David's, were not built until 1866 and 1880, respectively, though there is a large Catholic church, dedicated to St. Charles Borromeo, which was founded in 1858.
Tudhoe was renowned as a mining village until the end of the 20th century. Until the closure of the mines, the wealthy Colliery Masters took up residence in a grand mansion known as The Loggins, which stands in several acres of its own land and overlooks the area.
References
External links
Village history
Picture Spennymoor (including Tudhoe)
Tudhoe Cricket Club
Villages in County Durham
Spennymoor |
https://en.wikipedia.org/wiki/EGL%20%28programming%20language%29 | EGL (Enterprise Generation Language), originally developed by IBM and now available as the EDT (EGL Development Tools) open source project under the Eclipse Public License (EPL), is a programming technology designed to meet the challenges of modern, multi-platform application development by providing a common language and programming model across languages, frameworks, and runtime platforms.
Overview
The language borrows concepts familiar to anyone using statically typed languages like Java, COBOL, C, etc. However, it borrows the concept of stereotype from Unified Modeling Language (UML) that is not typically found in statically typed programming languages. In a nutshell, EGL is a higher-level, universal application development language.
EGL is similar in syntax to other common languages so it can be learned by application developers with similar previous programming background. EGL application development abstractions shield programmers from the technical interfaces of systems and middleware allowing them to focus on building business functionality.
EGL applications and services are written, tested and debugged at the EGL source level, and once they are satisfactorily functionally tested they can be compiled into COBOL, Java, or JavaScript code to support deployment of business applications that can run in any of the following environments:
Platforms with a Java virtual machine, such as Microsoft Windows, Linux, and UNIX, for example in the context of a Java EE servlet container (IBM WebSphere Application Server, Apache Tomcat, GlassFish)
IBM System z: CICS Transaction Server, IMS, z/OS Batch, UNIX System Services, WebSphere Application Server, z/VSE, Linux
IBM Power Systems: IBM i, IBM WebSphere Application Server, Apache Tomcat, Integrated Web Application Server for i
Web browsers supporting JavaScript, such as Internet Explorer, Firefox, and Safari, for Ajax rich web applications
Code examples
Program
An EGL Program part is a generatable logic part with one entry point. Each Program part contains a main() function, which represents the logic that runs at program start up. A program can include other functions and can access functions that are outside of the program. The function main() can invoke those other functions. Program functions are composed of a set of EGL statements, variables, and constants.
Program HelloWorld
const GREETING string = "Hello, ";
function main()
myName string = "John";
sayHello(myName);
end
function sayHello(name String in)
SysLib.writeStdOut(GREETING + name + "!");
end
end
Record
An EGL Record part defines a set of data elements. In this example, a record with the name CustomerRecord is defined with 6 fields.
Record CustomerRecord type BasicRecord
customerNumber INT;
customerName STRING;
customerAddr1 STRING;
customerAddr2 STRING;
customerAddr3 STRING;
customerBalance MONEY;
end
EGL has a specialized type of record called SQLRecord that is used to exchange data with a |
https://en.wikipedia.org/wiki/ScientificPython | ScientificPython is an open source library of scientific tools for the Python programming language. Its development started in 1995.
It has not been updated since October 1, 2014.
The library includes
mathematical tools like
Differentiation for functions of any number of variables up to any order
Numerical integration using the Romberg algorithm
Newton–Raphson for numerical root finding
Non-linear least squares fitting
support for parallel computing
Bulk synchronous parallel
Message Passing Interface
and several input/output interfaces, notably with
NetCDF files
Protein Data Bank files
Fortran-compatible text formatting
VRML for 3D visualizations
Qt and Tk widget toolkits are provided for building cross-platform graphical user interfaces.
ScientificPython is released under the CeCILL.
The main developer and maintainer of ScientificPython is Konrad Hinsen of Orléans University who uses it as a building block for his own research code, in particular the molecular modeling toolkit MMTK and the software nMoldyn that uses molecular dynamics trajectories to predict neutron scattering spectra. Outside this particular application context, most users are likely to prefer the package SciPy, which has seen a more dynamic evolution in the decade 2000–2010, involving several active developers.
See also
List of numerical-analysis software
References
External links
Free science software
Numerical programming languages
Python (programming language) scientific libraries |
https://en.wikipedia.org/wiki/Cc65 | cc65 is a cross development package for 6502 and 65C02 targets, including a macro assembler, a C cross compiler, linker, librarian and several other tools.
Overview
cc65 is based on a native C compiler that was originally adapted for the Atari 8-bit computers by John R. Dunning in 1989, which originated as a Small-C descendant. It has several extensions, and some of the limits of the original Small C compiler are gone.
The toolkit has largely been expanded by Ullrich von Bassewitz and other contributors. The actual cc65 compiler, a complete set of binary tools (assembler, linker, etc.) and runtime library are under a license identical to zlib's.
The compiler itself comes close to ANSI C compatibility, while C library features depend on the target platform's hardware. stdio is supported on many platforms, as is Borland-style screen handling. GEOS is also supported on the Commodore 64 and the Apple II. The library supports many of the Commodore platforms (C64, C128, C16/116/Plus/4, P500 and 600/700 family), Apple II family, Atari 8-bit family, Oric Atmos, Nintendo Entertainment System, Watara Supervision game console, Synertek Systems SYM-1 and Ohio Scientific Challenger 1P.
Officially supported host systems include Linux, Microsoft Windows, MS-DOS and OS/2, but the source code itself has been reported to work almost unmodified on many platforms beside these.
The ca65 macro assembler supports 6502, 65C02, and 65C816 processors, and can be used standalone without the C compiler.
Supported API
static
conio (text-based console I/O non-scrolling)
dio (block-oriented disk I/O bypassing the file system)
dynamic
em (expanded memory, used for all kinds of memory beyond the 6502's 64K barrier, similar EMS)
joystick (relative input devices)
mouse (absolute input devices)
serial (communication)
tgi (2D graphics primitives inspired by BGI)
Note: For static libraries, "Yes" means the feature is available. For dynamic libraries, the columns list the number of available drivers.
References
External links
Official website (archive) (no longer maintained)
Modern github fork of cc65
Contiki desktop, written with cc65
Atari TGI 2009-11-02 release announcement on cc65 mailing list
Android host
C (programming language) compilers
Cross-compilers
Free compilers and interpreters
Assemblers
Atari 8-bit family
Commodore 64
Apple II family |
https://en.wikipedia.org/wiki/Cline%20%28surname%29 | Cline is a surname. It is an anglicisation of the German name Klein and Gaelic Clyne. Notable people with the surname include:
Alan Cline, American computer scientist
Aleisha Cline (born 1970), Canadian skier
Alex Cline (born 1956), American drummer
Alfred Leonard Cline (1888–1948), American serial killer
Alice C. Parker, née Cline, American electrical engineer
Amy F. Cline (born 1974), American judge
Ben Cline (born 1972), American politician
Bill Cline (born 1943), American football player
Bob Cline (1933–2020), American politician
Bruce Cline (born 1931), Canadian ice hockey player
Cass A. Cline (1850–1926), American pioneer
Catherine Ann Cline (1927–2005), American historian and author
Charles Cline (disambiguation), multiple people
Chris Cline (1958–2019), American businessman
Curly Ray Cline (1923–1997), American fiddler
Cyrus Cline (1856–1923), American politician
David Cline (activist) (1947–2007), American veterans activist
David B. Cline (1933–2015), American physicist
Donald Cline, American fertility specialist, biological father of at least 96 people
Edward Cline (born 1946), American screenwriter and director
Edward F. Cline (1891–1961), American screenwriter
Emma Cline, American writer
Eric Cline (born 1955), Canadian politician
Eric H. Cline (born 1960), American archaeologist
Ernest Cline (born 1972), American comedian and screenwriter
Ezra Cline (1907–1984), American bassist
Genevieve R. Cline (1877–1959), American judge
Gloria Griffen Cline (1923–1973), American historian
Henry Cline (1750–1827), English surgeon
Hernán Cline (born 1973), Uruguayan cyclist
Hollis Cline, American neuroscientist
Howard F. Cline (1915-1971), American historian
Isaac Cline (1861–1955), American meteorologist
Jackie Cline (born 1960), American football player
James J. Cline (1899–1969), American football coach
Judy Wills Cline (born 1948), American trampoline gymnast
Kameron Cline (born 1998), American football player
Keita Cline (born 1974), Virgin Island athlete
Leonard Cline (1893–1929), American novelist
Leticia Cline (born 1978), American model
Madelyn Cline (born 1997), American actress
Maggie Cline (1857–1923), Irish-American singer
Mark Cline (born 1961), American artist
Martin Cline (born 1934), American geneticist
Melanie Cline (born 1975), American motocross racer
Melissa S. Cline, American biologist
Milton W. Cline (1825–1911), American sailor
Monk Cline (1858–1916), American baseball player
Nels Cline (born 1956), American guitarist and composer
Ollie Cline (1925–2001), American football player
Patsy Cline (disambiguation), multiple people
Ray S. Cline (1918–1996), American intelligence officer
Russ Cline, American lacrosse executive
Russell Cline (born 1965), American currency trader
Sperry Cline (1881–1964), Canadian policeman
Sue Cline (1946-2021), American politician
Terry Cline (born 1958), American psychologist
T. J. Cline (born 1994), American-Israeli basketball player
Tony Cline (1948–2018), American football player
Tony Cline J |
https://en.wikipedia.org/wiki/Black%20Perl | "Black Perl" is a code poem written using the Perl programming language. It was posted anonymously to Usenet on April 1, 1990, and is popular among Perl programmers as a piece of Perl poetry. Written in Perl 3, the poem is able to be executed as a program.
Attribution
When posted to the comp.lang.perl newsgroup the poem was attributed to "a person who wishes to remain anonymous". Sharon Rauenzahn (née Hopkins), another Perl poet, has been suspected to be the author but has since denied the claim.
Result of program execution
When executed, Black Perl exits on line one, upon reaching the function exit. The remaining lines are parsed by the Perl interpreter but never actually executed. The program produces no output.
Though it will not parse under Perl 5, multiple independent updates to Black Perl to make it parsable in Perl 5 have been published.
"Black Perl"
BEFOREHAND: close door, each window & exit; wait until time.
open spellbook, study, read (scan, select, tell us);
write it, print the hex while each watches,
reverse its length, write again;
kill spiders, pop them, chop, split, kill them.
unlink arms, shift, wait & listen (listening, wait),
sort the flock (then, warn the "goats" & kill the "sheep");
kill them, dump qualms, shift moralities,
values aside, each one;
die sheep! die to reverse the system
you accept (reject, respect);
next step,
kill the next sacrifice, each sacrifice,
wait, redo ritual until "all the spirits are pleased";
do it ("as they say").
do it(*everyone***must***participate***in***forbidden**s*e*x*).
return last victim; package body;
exit crypt (time, times & "half a time") & close it,
select (quickly) & warn your next victim;
AFTERWORDS: tell nobody.
wait, wait until time;
wait until next year, next decade;
sleep, sleep, die yourself,
die at last
See also
Digital poetry
PerlMonks
References
American poems
Perl
1990 poems |
https://en.wikipedia.org/wiki/Ren%20%26%20Stimpy%20%22Adult%20Party%20Cartoon%22 | Ren & Stimpy "Adult Party Cartoon" is an animated television series created by Canadian animator John Kricfalusi for the cable network Spike TV. The series was developed as a more "extreme" revamp and spin-off of The Ren & Stimpy Show, which previously aired on the American cable network Nickelodeon. The series premiered on June 26, 2003, and was removed from the network on July 24, after airing only three episodes; the remaining episodes were released on DVD. During its run, Adult Party Cartoon was heavily panned by critics, audiences and fans of the original series. It has been referred to as one of the worst animated series of all time.
History
The original Ren & Stimpy Show premiered alongside Rugrats and Doug as one of the original Nicktoons on children's network Nickelodeon in 1991. The show's creator, John Kricfalusi, had many altercations with the network, eventually culminating in his termination. In 2002, about a decade after Kricfalusi's termination, Viacom (which owns Nickelodeon) contacted him to produce a new version of his series for an updated version of TNN, Spike TV, which was devoted to programming for male audiences. Kricfalusi said that TNN wanted an "extreme" version of The Ren & Stimpy Show. TNN gave Kricfalusi greater control of the writing and contents of the episodes, and he produced six new episodes aimed at adult audiences. As in the original series, Kricfalusi ran into problems with meeting production deadlines, with only three out of the nine episodes ordered by the network being completed on time.
Some of the original voice cast members returned, with the exception of Billy West, original voice of Stimpy and second voice of Ren and Mr. Horse, who turned down the role, as he did not consider it funny and felt that participating in it would damage his career. Eric Bauza was hired to replace West as Stimpy, while Kricfalusi reprised his roles as Ren and Mr. Horse. Cast members Harris Peet and Cheryl Chase also returned, and Kricfalusi's father Mike Kricfalusi and long-time childhood friend Tom Hay provided some voices.
The new series began airing in June 2003 as part of an animation block also featuring Gary the Rat, Stripperella, and digitally remastered episodes of the original Ren & Stimpy series, subtitled "Digitally Remastered Classics". Kricfalusi wrote the first episode, "Onward and Upward", based on requests from fans from the Nickelodeon era. The episode portrayed the characters as bisexual. Advertisers objected to some of the new show's content, particularly that of the risqué episode "Naked Beach Frenzy", which did not air in the show's original run, causing trouble with scheduling. The show stopped airing after three episodes when TNN's animation block was "put on hold".
The remaining episodes were set to resume in August 2004 along with the premiere of Spike's new animated series Immigrants but both shows were pulled and never aired again.
Kricfalusi shut down Spümcø shortly on July 18, 2005, thereaft |
https://en.wikipedia.org/wiki/NetFlow | NetFlow is a feature that was introduced on Cisco routers around 1996 that provides the ability to collect IP network traffic as it enters or exits an interface. By analyzing the data provided by NetFlow, a network administrator can determine things such as the source and destination of traffic, class of service, and the causes of congestion. A typical flow monitoring setup (using NetFlow) consists of three main components:
Flow exporter: aggregates packets into flows and exports flow records towards one or more flow collectors.
Flow collector: responsible for reception, storage and pre-processing of flow data received from a flow exporter.
Analysis application: analyzes received flow data in the context of intrusion detection or traffic profiling, for example.
Protocol description
Routers and switches that support NetFlow can collect IP traffic statistics on all interfaces where NetFlow is enabled, and later export those statistics as NetFlow records toward at least one NetFlow collector—typically a server that does the actual traffic analysis.
Network flows
Cisco standard NetFlow version 5 defines a flow as a unidirectional sequence of packets that all share seven values which define a unique key for the flow:
Ingress interface (SNMP ifIndex)
Source IP address
Destination IP address
IP protocol number
Source port for UDP or TCP, 0 for other protocols
Destination port for UDP or TCP, type and code for ICMP, or 0 for other protocols
IP Type of Service
Note that the Egress interface, IP Nexthop or BGP Nexthops are not part of the key, and may not be accurate if the route changes before the expiration of the flow, or if load-balancing is done per-packet.
This definition of flows is also used for IPv6, and a similar definition is used for MPLS and Ethernet flows.
Advanced NetFlow or IPFIX implementations like Cisco Flexible NetFlow allow user-defined flow keys.
A typical output of a NetFlow command line tool (nfdump in this case) when printing the stored flows may look as follows:
Date flow start Duration Proto Src IP Addr:Port Dst IP Addr:Port Packets Bytes Flows
2010-09-01 00:00:00.459 0.000 UDP 127.0.0.1:24920 -> 192.168.0.1:22126 1 46 1
2010-09-01 00:00:00.363 0.000 UDP 192.168.0.1:22126 -> 127.0.0.1:24920 1 80 1
Export of records
The router will output a flow record when it determines that the flow is finished. It does this by flow aging: when the router sees new traffic for an existing flow it resets the aging counter. Also, TCP session termination in a TCP flow causes the router to expire the flow. Routers can also be configured to output a flow record at a fixed interval even if the flow is still ongoing.
Packet transport protocol
NetFlow records are traditionally exported using User Datagram Protocol (UDP) and collected using a NetFlow collector.
The IP address of the NetFlow collector and the destination UDP port must be confi |
https://en.wikipedia.org/wiki/Van%20Jacobson | Van Jacobson is an American computer scientist, renowned for his work on TCP/IP network performance and scaling. He is one of the primary contributors to the TCP/IP protocol stack—the technological foundation of today’s Internet. Since 2013, Jacobson is an adjunct professor at the University of California, Los Angeles (UCLA) working on Named Data Networking.
Early life and education
Jacobson studied Modern Poetry, Physics, and Mathematics and received an M.S. in physics and a B.S. in mathematics from the University of Arizona. He did graduate work at Lawrence Berkeley Laboratory.
Career
His work redesigning TCP/IP's congestion control algorithms (Jacobson's algorithm) to better handle congestion is said to have saved the Internet from collapsing in the late 1980s and early 1990s. He is also known for the TCP/IP Header Compression protocol described in RFC 1144: Compressing TCP/IP Headers for Low-Speed Serial Links, popularly known as Van Jacobson TCP/IP Header Compression.
He is the co-author of several widely used network diagnostic tools, including traceroute, tcpdump, and pathchar. He was a leader in the development of the multicast backbone (MBone) and the multimedia tools vic, vat, and wb.
Jacobson worked at the Lawrence Berkeley Laboratory from 1974 to 1998 as a Research scientist in the Real-time Controls Group and later group leader for the Network Research Group. He was Chief Scientist at Cisco Systems from 1998 to 2000. In 2000 he became Chief Scientist for Packet Design, Inc. and in 2002 for a spin-off, Precision I/O. He joined PARC as a research fellow in August 2006.
In January 2006 at Linux.conf.au, Jacobson presented another idea about network performance improvement, which has since been referred to as network channels. Jacobson discussed his ideas on Named data networking (NDN), the focus of his work at PARC, in August 2006 as part of the Google Tech Talks. Van Jacobson is now working with the NDN Consortium funded by the National Science Foundation to explore and create the future of the internet.
Awards and memberships
Van Jacobson together with his colleague at LBL, Steven McCanne, won R&D Magazine's 1995 R&D 100 Award for development of a software toolpack that enables multiparty audio and visual conferencing via the MBone (Multicast Backbone).
For his work, Jacobson received the 2001 ACM SIGCOMM Award for Lifetime Achievement "for contributions to protocol architecture and congestion control", the 2002 IEEE Koji Kobayashi Computers and Communications Award, and was elected to the National Academy of Engineering in 2004 for his "contributions to network protocols, including multicasting and the control of congestion."
In 2012, Jacobson was inducted into the Internet Hall of Fame by the Internet Society.
See also
Content centric networking
References
External links
Van Jacobson Denies Averting Internet Meltdown in 1980s (Cade Metz, Wired, 2012-05-25)
American computer scientists
Computer systems researcher |
https://en.wikipedia.org/wiki/Van%20Jacobson%20TCP/IP%20Header%20Compression | Van Jacobson TCP/IP Header Compression is a data compression protocol described in RFC 1144, specifically designed by Van Jacobson to improve TCP/IP performance over slow serial links. Van Jacobson compression reduces the normal 40 byte TCP/IP packet headers down to 3–4 bytes for the average case; it does this by saving the state of TCP connections at both ends of a link, and only sending the differences in the header fields that change. This makes a very big difference for interactive performance on low speed links, although it will not do anything about the processing delay inherent to most dial-up modems.
Van Jacobson Header Compression (also VJ compression, or just Header Compression) is an option in most versions of PPP. Versions of Serial Line Internet Protocol (SLIP) with VJ compression are often called CSLIP (Compressed SLIP).
External links
References
Data compression
TCP extensions |
https://en.wikipedia.org/wiki/File%20association | In computing, a file association associates a file with an application capable of opening that file. More commonly, a file association associates a class of files (usually determined by their filename extension, such as .txt) with a corresponding application (such as a text editor).
Associations and verbs
A single file extension may have several associations for performing various actions, also known as verbs. Some of the common verbs are:
open to open a file
edit to open a file for editing
print to print a file
A picture, for example, may be associated with these words so that open opens the picture in an image viewer, edit opens up an image editing program and print sends the picture to a printer.
Implementations
Most operating systems support file associations in some form or the other. For example, opening a file from a file manager usually invokes the open verb in order to open the file with its associated application. The "open" verb invokes the associated application program, which reads the file or document and presents it to the user for viewing, and possibly for editing or other action.
Additional actions such as print are usually accessed via a right-click context menu. A mechanism for modifying associations is also usually present. An example for this is the Open With option in the Windows Shell.
Microsoft Windows
The Microsoft Windows series of operating systems, beginning with Windows 3.x supports file extension-based associations. Associations are stored in registry as sets of verbs for each file extension. Older versions supported open associations stored in WIN.INI.
File associations can be displayed and edited using the assoc command and with the help of the ftype command it is possible to create association between file type and application which will open files of this type.
The Windows shell invokes file association actions through COM, drag and drop, command line calls or through Dynamic Data Exchange. Advanced features of Microsoft Windows file associations included manually defining a new file extension with any number of associated actions, a primary default action, showing extensions only for specific file types, customizing the file type icon and description and customizing associated MIME type and their handling (how to handle file types for files downloaded or directly opened from within the Internet Explorer browser). The ability to configure advanced file association functionality, however, was removed in Windows Vista and later operating systems.
Linux
Linux-based GUIs, such as KDE and GNOME, support MIME type-based associations. For example, the MIME type text/plain would be associated with a text editor.
Mac OS
The Classic Mac OS used type codes and creator codes to associate each file with its corresponding application, regardless of file extension. The more recent macOS also supports file extension–based associations.
Application bundles in macOS declare supported file types in their Info.plist file |
https://en.wikipedia.org/wiki/Anacreon%3A%20Reconstruction%204021 | Anacreon: Reconstruction 4021 is a video game written by George Moromisato for MS-DOS and published by Thinking Machine Associates in 1987. Anacreon is a turn-based game in which human and computer players explore the galaxy, conquering worlds and putting them to use to fuel their war machines. it resembles Stellar Conquest and Hamurabi. It was inspired by Isaac Asimov's Foundation series of novels.
A Windows remake, Anacreon: Imperial Conquest in the Far Future, was released by George Moromisato in 2004. Beta-testing for Anacreon 3, a new web-based version, started in late 2012.
Gameplay
The gameplay focuses on optimizing resource management on a network of conquered worlds in order to fuel further conquest. As worlds are discovered and (hopefully) conquered, they are put to uses that best suit their climates, natural resource bases, and technology levels, with networks of transport fleets relaying various types of material from world to world. These captured worlds and vulnerable transport fleets must be protected against incursions from competing players, both human- and computer-controlled. Success in Anacreon requires a good grasp of micromanagement strategy.
Combat, both fleet versus fleet and planetary invasions, is handled in a simple tactical display, with the defender's ships and/or planetary defenses arranged in distinct orbits. Only the attacker has any control over the course of combat. The defender may send an empire-wide allocation of ships into various orbits, but defending forces are handled automatically by the computer. Unlike many games in similar genres, combat is almost entirely a matter of numbers. Though movement between orbits and the kind of ships targeted are left up to the attacker, combat is resolved automatically with very little chance involved. The player with the more powerful fleet will almost certainly win, though if the odds are close enough, it is possible for an attacker to lose due to mismanagement.
Many features now commonplace in science-fiction 4X games—Master of Orion, Pax Imperia, Galactic Civilizations—can be found, arguably, originally in Anacreon. The game includes four different kinds of planetary defense, each with different ranges and potencies, five kinds of warship, two transport classes, and two grades of ground troops. Ships range in speed from slow warp drives (one sector per turn) to fast jump drives (ten sectors per turn), and making the best use of the different ship classes is one of the more important features of the game.
Basic resources consist of chemicals, metals, supplies, and "trillum", the latter of which serves as fuel for the game's interstellar ships. Chemicals, metals, and supplies may be produced ad infinitum, but each world comes with trillum deposits of a fixed value which, once depleted, cannot be restored. For this reason, the control and distribution of trillum resources becomes of essential importance, especially late in the game. The game also includes |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.